Sciweavers

6300 search results - page 1258 / 1260
» We have it easy, but do we have it right
Sort
View
ICDCS
2011
IEEE
12 years 6 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
ASPLOS
2012
ACM
12 years 2 months ago
Relyzer: exploiting application-level fault equivalence to analyze application resiliency to transient faults
Future microprocessors need low-cost solutions for reliable operation in the presence of failure-prone devices. A promising approach is to detect hardware faults by deploying low-...
Siva Kumar Sastry Hari, Sarita V. Adve, Helia Naei...
BTW
2007
Springer
245views Database» more  BTW 2007»
14 years 26 days ago
From Personal Desktops to Personal Dataspaces: A Report on Building the iMeMex Personal Dataspace Management System
Abstract: We propose a new system that is able to handle the entire Personal Dataspace of a user. A Personal Dataspace includes all data pertaining to a user on all his disks and o...
Jens-Peter Dittrich, Lukas Blunschi, Markus Fä...
BIBE
2007
IEEE
191views Bioinformatics» more  BIBE 2007»
14 years 1 months ago
PANP - a New Method of Gene Detection on Oligonucleotide Expression Arrays
Abstract. Currently, the method most used for gene detection calls on Affymetrix oligonucleotide arrays is provided as part of the MAS5.0 software. The MAS method uses Wilcoxon sta...
Peter Warren, Deanne Taylor, Paolo G. V. Martini, ...
EUROSYS
2010
ACM
14 years 24 days ago
PUSH: A Dataflow Shell
The deluge of huge data sets such as those provided by sensor networks, online transactions, and the web provide exciting opportunities for data analysis. The scale of the data ...
Noah Evans, Eric Van Hensbergen
« Prev « First page 1258 / 1260 Last » Next »