Sciweavers

2168 search results - page 376 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
148
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
Complexity in wireless scheduling: impact and tradeoffs
It has been an important research topic since 1992 to maximize stability region in constrained queueing systems, which includes the study of scheduling over wireless ad hoc networ...
Yung Yi, Alexandre Proutiere, Mung Chiang
137
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
Low-coordination topologies for redundancy in sensor networks
Tiny, low-cost sensor devices are expected to be failure-prone and hence in many realistic deployment scenarios for sensor networks these nodes are deployed in higher than necessa...
Rajagopal Iyengar, Koushik Kar, Suman Banerjee
203
Voted
SOSP
2003
ACM
16 years 15 days ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
130
Voted
SAC
2009
ACM
15 years 10 months ago
DARAW: a new write buffer to improve parallel I/O energy-efficiency
In the past decades, parallel I/O systems have been used widely to support scientific and commercial applications. New data centers today employ huge quantities of I/O systems, wh...
Xiaojun Ruan, Adam Manzanares, Kiranmai Bellam, Xi...
MHCI
2009
Springer
15 years 8 months ago
pieTouch: a direct touch gesture interface for interacting with in-vehicle information systems
Touch-sensitive displays seem like a natural and promising option for dealing with the increasing complexity of current in-vehicle information systems (IVIS), but since they can h...
Ronald Ecker, Verena Broy, Andreas Butz, Alexander...