Sciweavers

769 search results - page 72 / 154
» Identifying objects in legacy systems
Sort
View
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 7 months ago
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system ...
Shin-ichi Kuribayashi
SRDS
2010
IEEE
13 years 5 months ago
A Cooperative Sampling Approach to Discovering Optimal Configurations in Large Scale Computing Systems
With the growing scale of current computing systems, traditional configuration tuning methods become less effective because they usually assume a small number of parameters in the...
Haifeng Chen, Guofei Jiang, Hui Zhang 0002, Kenji ...
ICDE
2010
IEEE
292views Database» more  ICDE 2010»
14 years 7 months ago
Exploring Power-Performance Tradeoffs in Database Systems
With the total energy consumption of computing systems increasing in a steep rate, much attention has been paid to the design of energy-efficient computing systems and applications...
Zichen Xu, Yi-Cheng Tu, Xiaorui Wang
CODES
2009
IEEE
14 years 2 months ago
Exploiting data-redundancy in reliability-aware networked embedded system design
This paper presents a system-level design methodology for networked embedded systems that exploits existing data-redundancy to increase their reliability. The presented approach n...
Martin Lukasiewycz, Michael Glaß, Jürge...
IPPS
2002
IEEE
14 years 21 days ago
A Comparative Study of Parallel and Distributed Java Projects for Heterogeneous Systems
During the last few years, the concepts of cluster computing and heterogeneous networked systems have received increasing interest. The popularity of using Java for developing par...
Jameela Al-Jaroodi, Nader Mohamed, Hong Jiang, Dav...