Sciweavers

173 search results - page 24 / 35
» Towards a monitoring system for High Altitude Objects
Sort
View
HASE
1999
IEEE
13 years 12 months ago
Building Dependable Distributed Applications Using AQUA
Building dependable distributed systems using ad hoc methods is a challenging task. Without proper support, an application programmer must face the daunting requirement of having ...
Jennifer Ren, Michel Cukier, Paul Rubel, William H...
ISCA
1998
IEEE
119views Hardware» more  ISCA 1998»
13 years 12 months ago
Using Prediction to Accelerate Coherence Protocols
Most large shared-memory multiprocessors use directory protocols to keep per-processor caches coherent. Some memory references in such systems, however, suffer long latencies for ...
Shubhendu S. Mukherjee, Mark D. Hill
CSREAPSC
2006
13 years 9 months ago
The Anatomy of a Universal Domotics Integrator for Globally Interconnected Devices
Home Automation Technologies make possible the deployment of home monitoring and control applications. These technologies rely on different networking technologies. Some of them ar...
Driart Elshani, Pascal Francq
SUTC
2010
IEEE
13 years 6 months ago
Battery Level Estimation of Mobile Agents under Communication Constraints
We consider a team of mobile agents where a leader has to monitor battery levels of all other agents. Only the leader is capable to transmit information to other agents. Every now...
Jonghoek Kim, Fumin Zhang, Magnus Egerstedt
DIMVA
2011
12 years 11 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...