Sciweavers

614 search results - page 121 / 123
» Scheduling under resource constraints using dis-equations
Sort
View
SENSYS
2003
ACM
14 years 24 days ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
ANCS
2011
ACM
12 years 7 months ago
ReClick - A Modular Dataplane Design Framework for FPGA-Based Network Virtualization
Network virtualization has emerged as a powerful technique to deploy novel services and experimental protocols over shared network infrastructures. Although recent research has hi...
Deepak Unnikrishnan, Justin Lu, Lixin Gao, Russell...
AAAI
2008
13 years 10 months ago
ARMOR Security for Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Fernando Ordó&ntil...
DAGSTUHL
2006
13 years 9 months ago
A Petri Net Approach to Verify and Debug Simulation Models
Verification and Simulation share many issues, one is that simulation models require validation and verification. In the context of simulation, verification is understood as the ta...
Peter Kemper, Carsten Tepper
WSC
1997
13 years 9 months ago
Arena Software Tutorial
The Arena modeling system from Systems Modeling Corporation is a flexible and powerful tool that allows analysts to create animated simulation models that accurately represent vir...
David A. Takus, David M. Profozich