Sciweavers

327 search results - page 57 / 66
» The Effect of Detail on Ethernet Simulation
Sort
View
CCS
2010
ACM
13 years 7 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
CN
2010
152views more  CN 2010»
13 years 6 months ago
An environment-aware mobility model for wireless ad hoc network
Simulation is a cost effective, fast and flexible alternative to test-beds or practical deployment for evaluating the characteristics and potential of mobile ad hoc networks. Sinc...
Sabbir Ahmed, Gour C. Karmakar, Joarder Kamruzzama...
IS
2000
13 years 6 months ago
Concurrency control in mobile distributed real-time database systems
Abstract With the rapid advances in mobile computing technology, there is an increasing demand for processing realtime transactions in a mobile environment. This paper studies con...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...
HPCA
2006
IEEE
14 years 7 months ago
DMA-aware memory energy management
As increasingly larger memories are used to bridge the widening gap between processor and disk speeds, main memory energy consumption is becoming increasingly dominant. Even thoug...
Vivek Pandey, Weihang Jiang, Yuanyuan Zhou, Ricard...
SIGMOD
2005
ACM
127views Database» more  SIGMOD 2005»
14 years 6 months ago
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records
As critical records are increasingly stored in electronic form, which tends to make for easy destruction and clandestine modification, it is imperative that they be properly manag...
Qingbo Zhu, Windsor W. Hsu