Sciweavers

7741 search results - page 1391 / 1549
» Security in Active Networks
Sort
View
DAC
2004
ACM
16 years 5 months ago
Memory access scheduling and binding considering energy minimization in multi-bank memory systems
Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g....
Chun-Gi Lyuh, Taewhan Kim
230
Voted
WWW
2007
ACM
16 years 5 months ago
Life is sharable: mechanisms to support and sustain blogging life experience
Recent trend in the development of mobile devices, wireless communications, sensor technologies, weblogs, and peer-to-peer communications have prompted a new design opportunity fo...
Yun-Maw Cheng, Tzu-Chuan Chou, Wai Yu, Li-Chieh Ch...
CHI
2006
ACM
16 years 5 months ago
Talk to me: foundations for successful individual-group interactions in online communities
People come to online communities seeking information, encouragement, and conversation. When a community responds, participants benefit and become more committed. Yet interactions...
Jaime Arguello, Brian S. Butler, Elisabeth Joyce, ...
GLOBECOM
2009
IEEE
15 years 11 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
IPPS
2008
IEEE
15 years 11 months ago
Data throttling for data-intensive workflows
— Existing workflow systems attempt to achieve high performance by intelligently scheduling tasks on resources, sometimes even attempting to move the largest data files on the hi...
Sang-Min Park, Marty Humphrey
« Prev « First page 1391 / 1549 Last » Next »