Sciweavers

2030 search results - page 320 / 406
» The Need for Customizable Operating Systems
Sort
View
MOBICOM
2005
ACM
14 years 2 months ago
Challenges: communication through silence in wireless sensor networks
Wireless sensor networks (WSNs) are typically characterized by a limited energy supply at sensor nodes. Hence, energy efficiency is an important issue in the system design and op...
Yujie Zhu, Raghupathy Sivakumar
SC
2005
ACM
14 years 2 months ago
Performance-constrained Distributed DVS Scheduling for Scientific Applications on Power-aware Clusters
Left unchecked, the fundamental drive to increase peak performance using tens of thousands of power hungry components will lead to intolerable operating costs and failure rates. H...
Rong Ge, Xizhou Feng, Kirk W. Cameron
WIKIS
2005
ACM
14 years 2 months ago
Wikis in teaching and assessment: the M/Cyclopedia project
In a knowledge-based, networked economy, students leaving university need to have attained skills in collaborative and creative project-based work and to have developed critical, ...
Axel Bruns, Sal Humphreys
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
14 years 2 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee