Sciweavers

7329 search results - page 1427 / 1466
» Software Architectural Transformation
Sort
View
PERCOM
2009
ACM
14 years 5 months ago
BitHoc: A content sharing application for Wireless Ad hoc Networks
—As a result of the wide spread of new efficient mobile communication devices, users are more and more willing to find on these devices (PDAs, Smartphones, etc) applications si...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
SENSYS
2009
ACM
14 years 5 months ago
Canopy closure estimates with GreenOrbs: sustainable sensing in the forest
Motivated by the needs of precise forest inventory and realtime surveillance for ecosystem management, in this paper we present GreenOrbs [1], a wireless sensor network system and...
Lufeng Mo, Yuan He, Yunhao Liu, Jizhong Zhao, Shao...
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 5 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
HPDC
2009
IEEE
14 years 5 months ago
Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems
Since the advent of electronic computing, the processors’ clock speed has risen tremendously. Now that energy efficiency requirements have stopped that trend, the number of proc...
Björn Saballus, Thomas Fuhrmann
MICRO
2009
IEEE
132views Hardware» more  MICRO 2009»
14 years 5 months ago
Finding concurrency bugs with context-aware communication graphs
Incorrect thread synchronization often leads to concurrency bugs that manifest nondeterministically and are difficult to detect and fix. Past work on detecting concurrency bugs ...
Brandon Lucia, Luis Ceze
« Prev « First page 1427 / 1466 Last » Next »