Results 1 -
9 of
9
Brawny vs. Wimpy: Evaluation and Analysis of Modern Workloads on Heterogeneous Processors
"... Abstract—Heterogeneous processors, consisting of a mix of high-performance ‘brawny ’ processors and low-power ‘wimpy’ processors, have been proposed to achieve higher energyefficiency by making it possible for different applications within a diverse mix of workloads to be run on the ‘most appropriat ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
experimental testbed comprised of real heterogeneous CPUs that differ in both their core architecture and cache sizes, comparing the performance and efficiency for these applications. Results show that heterogeneous processors can improve the performance and energyefficiency for these diverse applications
SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING
, 2012
"... This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reli ..."
Abstract
- Add to MetaCart
This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable
Guaranteeing Communication Quality in Real World WSN Deployments
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract
- Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:
Human Trust Establishment
, 2011
"... Users regularly experience a crisis of confidence on the Internet. Is that email truly originating from the claimed individual? Is that Facebook invitation indeed from that person or is it a fake page set up by an impersonator? These doubts are usually resolved through a leap of faith, expressing th ..."
Abstract
- Add to MetaCart
offering secrecy and authenticity, which we use to support secure messaging and file exchange. Essentially, we support an abstraction to safely “sling ” information from one device to another. 1 SafeSlinger also provides an API for importing applications’ public keys into a user’s contact information
AGR 05
"... Responses of soil biological processes to elevated atmospheric [CO2] and nitrogen addition in a poplar plantation ..."
Abstract
- Add to MetaCart
Responses of soil biological processes to elevated atmospheric [CO2] and nitrogen addition in a poplar plantation