Sciweavers

1272 search results - page 151 / 255
» Optimizing layered middleware
Sort
View
133
Voted
ICC
2007
IEEE
100views Communications» more  ICC 2007»
15 years 9 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
152
Voted
DEXA
2005
Springer
148views Database» more  DEXA 2005»
15 years 8 months ago
XG: A Data-Driven Computation Grid for Enterprise-Scale Mining
In this paper we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. We show how such an architecture can be le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Wen-...
146
Voted
TCAD
2008
195views more  TCAD 2008»
15 years 2 months ago
Multilayer Obstacle-Avoiding Rectilinear Steiner Tree Construction Based on Spanning Graphs
Given a set of pins and a set of obstacles on routing layers, a multilayer obstacle-avoiding rectilinear Steiner minimal tree (ML-OARSMT) connects these pins by rectilinear edges w...
Chung-Wei Lin, Shih-Lun Huang, Kai-Chi Hsu, Meng-X...
112
Voted
NSDI
2010
15 years 19 days ago
AccuRate: Constellation Based Rate Estimation in Wireless Networks
This paper proposes to exploit physical layer information towards improved rate selection in wireless networks. While existing schemes pick good transmission rates, this paper tak...
Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury...
118
Voted
AOSD
2008
ACM
15 years 4 months ago
Edicts: implementing features with flexible binding times
In a software product line, the binding time of a feature is the time at which one decides to include or exclude a feature from a product. Typical binding site implementations are...
Venkat Chakravarthy, John Regehr, Eric Eide