Sciweavers

834 search results - page 141 / 167
» Quantifying and Measuring Anonymity
Sort
View
WCRE
2007
IEEE
14 years 4 months ago
Examining the Effects of Global Data Usage on Software Maintainability
As the useful life expectancy of software continues to increase, the task of maintaining the source code has become the dominant phase of the software life-cycle. In order to impr...
Jason W. A. Selby, Fraser P. Ruffell, Mark Giesbre...
GLOBECOM
2006
IEEE
14 years 3 months ago
"Dude, where's my Peer?"
— Peer to Peer (P2P) flows constitute a large portion of Internet traffic meandering through different ISP domains. Hence, it is of prime concern for ISPs to try and gauge the ...
Anirban Banerjee, Abhishek Mitra, Michalis Falouts...
IISWC
2006
IEEE
14 years 3 months ago
Characterization of Error-Tolerant Applications when Protecting Control Data
Soft errors have become a significant concern and recent studies have measured the “architectural vulnerability factor” of systems to such errors, or conversely, the potentia...
Darshan D. Thaker, Diana Franklin, John Oliver, Su...
SENSYS
2006
ACM
14 years 3 months ago
Run-time dynamic linking for reprogramming wireless sensor networks
From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energ...
Adam Dunkels, Niclas Finne, Joakim Eriksson, Thiem...
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
14 years 3 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold