Sciweavers

2663 search results - page 355 / 533
» How to Choose a Timing Model
Sort
View
129
Voted
DAC
2007
ACM
15 years 7 months ago
Automotive Software Integration
A growing number of networked applications is implemented on increasingly complex automotive platforms with several bus standards and gateways. Together, they challenge the automo...
Razvan Racu, Arne Hamann, Rolf Ernst, Kai Richter
127
Voted
CHI
2007
ACM
16 years 3 months ago
Home networking and HCI: what hath god wrought?
For much of the industrialized world, network connectivity in the home is commonplace. Despite the large number of networked homes, even the most technically savvy people can have...
Erika Shehan, W. Keith Edwards
132
Voted
PERCOM
2008
ACM
16 years 3 months ago
Information Agents for Pervasive Sensor Networks
In this paper, we describe an information agent, that resides on a mobile computer or personal digital assistant (PDA), that can autonomously acquire sensor readings from pervasiv...
Alex Rogers, Mike Osborne, Sarvapali D. Ramchurn, ...
123
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
Target-Based Power Control for Queueing Systems with Applications to Packet Switches
—Many data center devices, for instance packet switches, can be modeled within the context of resource constrained queueing systems. In this paper, we define a novel algorithm c...
Benjamin Yolken, Dimitrios Tsamis, Nicholas Bambos
137
Voted
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 9 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003