Sciweavers

161 search results - page 20 / 33
» The influence of ATM on operating systems
Sort
View
RTSS
2007
IEEE
14 years 2 months ago
An Energy-Driven Design Methodology for Distributing DSP Applications across Wireless Sensor Networks
Wireless sensor network (WSN) applications have been studied extensively in recent years. Such applications involve resource-limited embedded sensor nodes that have small size and...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...
EMSOFT
2007
Springer
14 years 2 months ago
Uniformity improving page allocation for flash memory file systems
Flash memory is a storage medium that is becoming more and more popular. Though not yet fully embraced in traditional computing systems, Flash memory is prevalent in embedded syst...
Seungjae Baek, Seongjun Ahn, Jongmoo Choi, Donghee...
ICS
2000
Tsinghua U.
14 years 6 days ago
Using complete system simulation to characterize SPECjvm98 benchmarks
Complete system simulation to understand the influence of architecture and operating systems on application execution has been identified to be crucial for systems design. While t...
Tao Li, Lizy Kurian John, Narayanan Vijaykrishnan,...
HICSS
2006
IEEE
92views Biometrics» more  HICSS 2006»
14 years 2 months ago
Governance Options for Strategic Technology Alliances in Value Webs
Strategic alliances are the primary collaboration form for organizations participating in value webs, the most widely used form of structuring business activities in the digital e...
Adamantia G. Pateli, George M. Giaglis
ICNC
2005
Springer
14 years 2 months ago
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection
The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing intrusion detection systems. But the presence...
Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun ...