Results 11 - 20
of
26,742
Distributed packet switching for local computer networks
- Commun. ACM
, 1976
"... Abstract: Ethernet is a branching broadcast communication system for carrying digital data packets among locally distributed computing stations. The packet transport mechanism provided by Ethernet has been used to build systems which can be viewed as either local computer networks or loosely coupled ..."
Abstract
-
Cited by 467 (2 self)
- Add to MetaCart
Abstract: Ethernet is a branching broadcast communication system for carrying digital data packets among locally distributed computing stations. The packet transport mechanism provided by Ethernet has been used to build systems which can be viewed as either local computer networks or loosely
Habitat monitoring: application driver for wireless communications technology
- In ACM SIGCOMM Workshop on Data Communications in Latin America and the Caribbean
, 2001
"... lecs.cs.ucla.edu As new fabrication and integration technologies reduce the cost and size of micro-sensors and wireless interfaces, it becomes feasible to deploy densely distributed wireless networks of sensors and actuators. These systems promise to revolutionize biological, earth, and environmenta ..."
Abstract
-
Cited by 413 (39 self)
- Add to MetaCart
, and environmental monitoring applications, providing data at granularities unrealizable by other means. In addition to the challenges of miniaturization, new system architectures and new network algorithms must be developed to transform the vast quantity of raw sensor data into a manageable stream of high
The Landscape of Parallel Computing Research: A View from Berkeley
- TECHNICAL REPORT, UC BERKELEY
, 2006
"... ..."
Denial of Service in Sensor Networks
- Upper Saddle River
, 2002
"... Unless their developers take security into account at design time, sensor networks and the protocols they depend on will remain vulnerable to denial of service attacks. We identify denial of service weaknesses and solutions for sensor network devices and analyze two network protocols. ..."
Abstract
-
Cited by 462 (13 self)
- Add to MetaCart
Unless their developers take security into account at design time, sensor networks and the protocols they depend on will remain vulnerable to denial of service attacks. We identify denial of service weaknesses and solutions for sensor network devices and analyze two network protocols.
COST-EFFECTIVE SCALABLE QC-LDPC DECODER DESIGNS FOR NON-VOLATILE MEMORY SYSTEMS
"... This paper presents a cost-effective scalable quasi-cyclic LDPC (QC-LDPC) decoder architecture for non-volatile memory systems (NVMS). A re-arranged architecture is proposed to eliminate the first-in-first-out (FIFO) memory in conventional decoders, where the FIFO size is linearly proportional to th ..."
Abstract
- Add to MetaCart
to the codeword size. The area reduction is 18.5 % compared to the conventional decoder architecture. The scalable datapaths of the proposed decoder reduce the re-design cost and enable the flexibility of using QC-LDPC codes for NVMS. A prototyping decoder with maximum codeword size of 9280 bits is implemented
Charting Past, Present and Future Research in Ubiquitous Computing
- ACM Transactions on Computer-Human Interaction
, 2000
"... . The proliferation ofcomputing into the physical world promises more than the ubiquitous availability of computing infrastructure; it suggests new paradigms of interaction inspired by constant access to information and computational capabilities. For the past decade, applicationdriven research in ..."
Abstract
-
Cited by 433 (6 self)
- Add to MetaCart
. The proliferation ofcomputing into the physical world promises more than the ubiquitous availability of computing infrastructure; it suggests new paradigms of interaction inspired by constant access to information and computational capabilities. For the past decade, applicationdriven research in ubicomp has pushed three interaction themes: natural interfaces, context-aware applications, and automated capture and access. To chart a course for future research in ubiquitous computing, we review the accomplishments of these efforts and point to remaining research challenges. Research in ubiquitous computing implicitly requires addressing some notion of scale; whether in the number and type of devices, the physical space of distributed computing or the number of people using a system. We posit a new area of applications research, everyday computing, focussed on scaling interaction with respect to time. Just as pushing the availability of computing away from the traditional desktop fun...
What memory is for
- Behavioral and Brain Sciences
, 1997
"... What working memory is for Citation for published version: Logie, RH 1997, 'What working memory is for ' Behavioral and Brain Sciences, vol 20, no. 1, pp. 28. Link: Link to publication record in Edinburgh Research Explorer ..."
Abstract
-
Cited by 379 (5 self)
- Add to MetaCart
What working memory is for Citation for published version: Logie, RH 1997, 'What working memory is for ' Behavioral and Brain Sciences, vol 20, no. 1, pp. 28. Link: Link to publication record in Edinburgh Research Explorer
Results 11 - 20
of
26,742