Existing packets scheduling algorithms designed for energy-efficient wireless networks ignore important features of periodic packets, thereby being inadequate for periodic packets...
Xiao Qin, Mohammed I. Alghamdi, Mais Nijim, Zilian...
Sensor networks can be used for event alarming applications. To date, in most of the proposed schemes, the raw or aggregated sensed data is periodically sent to a data consuming c...
Successes and failures during rescue operations after hurricane Katrina and the Twin Towers attack demonstrated the importance of supporting first responders with adequate means t...
Marco Roccetti, Mario Gerla, Claudio E. Palazzi, S...
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
As Chip Multiprocessor (CMP) has become the mainstream in processor architectures, Intel and AMD have introduced their dual-core processors to the PC market. In this paper, perfor...
Lu Peng, Jih-Kwon Peir, Tribuvan K. Prakash, Yen-K...