Sciweavers

1833 search results - page 342 / 367
» Mechanized Verification with Sharing
Sort
View
IPPS
2006
IEEE
14 years 5 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
ISCA
2006
IEEE
138views Hardware» more  ISCA 2006»
14 years 5 months ago
Learning-Based SMT Processor Resource Distribution via Hill-Climbing
The key to high performance in Simultaneous Multithreaded (SMT) processors lies in optimizing the distribution of shared resources to active threads. Existing resource distributio...
Seungryul Choi, Donald Yeung
KBSE
2006
IEEE
14 years 5 months ago
Detecting Precedence-Related Advice Interference
Aspect-Oriented Programming (AOP) has been proposed in literature to overcome modularization shortcomings such as the tyranny of the dominant decomposition. However, the new langu...
Maximilian Storzer, Florian Forster
SIGECOM
2006
ACM
96views ECommerce» more  SIGECOM 2006»
14 years 4 months ago
Non-cooperative multicast and facility location games
We consider a multicast game with selfish non-cooperative players. There is a special source node and each player is interested in connecting to the source by making a routing de...
Chandra Chekuri, Julia Chuzhoy, Liane Lewin-Eytan,...
WIKIS
2006
ACM
14 years 4 months ago
WikiTrails: augmenting Wiki structure for collaborative, interdisciplinary learning
Wikis are currently in high demand in a large variety of fields, due to their simplicity and flexible nature. Documentation, reporting, project management, online glossaries and d...
Silvan Reinhold