Sciweavers

4451 search results - page 873 / 891
» Performance Modeling for Entity-Level Simulations
Sort
View
ECRTS
2007
IEEE
15 years 8 months ago
A Delay Composition Theorem for Real-Time Pipelines
Uniprocessor schedulability theory made great strides, in part, due to the simplicity of composing the delay of a job from the execution times of higher-priority jobs that preempt...
Praveen Jayachandran, Tarek F. Abdelzaher
ICC
2007
IEEE
228views Communications» more  ICC 2007»
15 years 8 months ago
A Non-Cooperative Power Control Game for Secondary Spectrum Sharing
—Limited spectrum resources, inefficient spectrum usage and increasing wireless communication necessitates a paradigm shift from the current fixed spectrum management policy to...
Juncheng Jia, Qian Zhang
IPPS
2007
IEEE
15 years 8 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
SECON
2007
IEEE
15 years 8 months ago
Coverage Problem for Sensors Embedded in Temperature Sensitive Environments
— The coverage and connectivity problem in sensor networks has received significant attention of the research community in the recent years. In this paper, we study this problem...
Arunabha Sen, Nibedita Das, Ling Zhou, Bao Hong Sh...
109
Voted
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 8 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...