Sciweavers

3515 search results - page 608 / 703
» Resource usage analysis
Sort
View
120
Voted
ISCAS
2005
IEEE
156views Hardware» more  ISCAS 2005»
15 years 8 months ago
Optimal 2 sub-bank memory architecture for bit plane coder of JPEG2000
—JPEG2000 image compression standard is designed to cater the needs of a large span of applications including numerous consumer products. However, its use is still restricted due...
Amit Kumar Gupta, Saeid Nooshabadi, David S. Taubm...
124
Voted
MOBIQUITOUS
2005
IEEE
15 years 8 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
RTAS
2005
IEEE
15 years 8 months ago
Hybrid Supervisory Utilization Control of Real-Time Systems
Feedback control real-time scheduling (FCS) aims at satisfying performance specifications of real-time systems based on adaptive resource management. Existing FCS algorithms often...
Xenofon D. Koutsoukos, Radhika Tekumalla, Balachan...
102
Voted
ACMACE
2005
ACM
15 years 8 months ago
Playmakers in multiplayer game communities: their importance and motivations for participation
In many game-like open-ended multiplayer communities, the success of the game, and well-being of the community, depends on the efforts of certain individuals who arrange resources...
Antti Salovaara, Mikael Johnson, Kalle Toiskallio,...
141
Voted
AOSD
2005
ACM
15 years 8 months ago
Towards just-in-time middleware architectures
Middleware becomes increasingly important in building distributed applications. Conventional middleware systems are designed, implemented, and packaged before applications are dev...
Charles Zhang, Dapeng Gao, Hans-Arno Jacobsen