Sciweavers

171 search results - page 18 / 35
» Modelling interdependencies between the electricity and info...
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Interference-Resilient Information Exchange
—This paper presents an efficient protocol to reliably exchange information in a single-hop radio network with unpredictable interference. The devices can access C communication...
Seth Gilbert, Rachid Guerraoui, Dariusz R. Kowalsk...
CIS
2006
Springer
13 years 11 months ago
Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment
The emerging ubiquitous computing is changing the current computing paradigm, and it lets the ubiquitous RFID applications consistently and independently utilize the sensed inform...
Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyu...
WSC
1997
13 years 9 months ago
Design and Implementation of HLA Time Management in the RTI Version F.0
The DoD High Level architecture (HLA) has recently become the required method for the interconnection of all DoD computer simulations. The HLA addresses the rules by which simulat...
Christopher D. Carothers, Richard Fujimoto, Richar...
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ISLPED
2010
ACM
205views Hardware» more  ISLPED 2010»
13 years 7 months ago
Peak power modeling for data center servers with switched-mode power supplies
Accurately modeling server power consumption is critical in designing data center power provisioning infrastructure. However, to date, most research proposals have used average CP...
David Meisner, Thomas F. Wenisch