Sciweavers

263 search results - page 51 / 53
» System design methodologies for a wireless security processi...
Sort
View
135
Voted
ANCS
2007
ACM
15 years 6 months ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos
132
Voted
ICCCN
2008
IEEE
15 years 9 months ago
A Structured Hardware/Software Architecture for Embedded Sensor Nodes
—Owing to the limited requirement for sensor processing in early networked sensor nodes, embedded software was generally built around the communication stack. Modern sensor nodes...
Geoff V. Merrett, Alex S. Weddell, Nick R. Harris,...
112
Voted
ASPLOS
2010
ACM
15 years 9 months ago
ParaLog: enabling and accelerating online parallel monitoring of multithreaded applications
Instruction-grain lifeguards monitor the events of a running application at the level of individual instructions in order to identify and help mitigate application bugs and securi...
Evangelos Vlachos, Michelle L. Goodstein, Michael ...
OOPSLA
2004
Springer
15 years 8 months ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
116
Voted
SENSYS
2006
ACM
15 years 8 months ago
The tenet architecture for tiered sensor networks
Most sensor network research and software design has been guided by an architectural principle that permits multi-node data fusion on small-form-factor, resource-poor nodes, or mo...
Omprakash Gnawali, Ki-Young Jang, Jeongyeup Paek, ...