• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 79
Next 10 →

Space Mission Characteristics and Requirements to be Addressed by Space-Data Router Enhancement of Space-Data Exploitation

by Ioannis A. Daglis, Olga Sykioti, Anastasios Anastasiadis, Georgios Balasis, Iphigenia Keramitsoglou, Dimitris Paronis, Athanassios Rontogiannis, Sotiris Diamantopoulos
"... Abstract. Data distribution and access are major issues in space sciences as they influence the degree of data exploitation. The project “Space-Data Routers ” (SDR) has the aim of allowing space agencies, academic institutes and research centres to share space data generated by single or multiple mi ..."
Abstract - Add to MetaCart
present the mission scenarios and the associated major SDR expected impact from the proposed space-data router enhancements.

doi:10.1155/2012/826702 Research Article Exploiting the Burstiness of Intermediate-Quality Wireless Links

by Muhammad Hamad Alizai, Olaf L, Klaus Wehrle
"... Copyright © 2012 Muhammad Hamad Alizai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We address the challenge of link estima ..."
Abstract - Add to MetaCart
Copyright © 2012 Muhammad Hamad Alizai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We address the challenge of link

Directions in Packet Classification for Network Processors

by Michael E. Kounavis, Alok Kumar, Harrick Vin, Raj Yavatkar, Andrew T. Campbell - In Proc. of Network Processor Workshop in conjunction with Ninth International Symposium on High Performance Computer Architecture (HPCA-9 , 2003
"... Abstract--To classify a packet as belonging to a flow often requires network systems—such as routers and firewalls—to maintain large data structures and perform several memory accesses. Network processors, on the other hand, are generally configured with only a small amount of memory with limited ac ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
Abstract--To classify a packet as belonging to a flow often requires network systems—such as routers and firewalls—to maintain large data structures and perform several memory accesses. Network processors, on the other hand, are generally configured with only a small amount of memory with limited

Guaranteeing Communication Quality in Real World WSN Deployments

by Fbk-irst Bruno, Kessler Foundation, Matteo Ceriotti, Dr. Amy, L. Murphy, Bruno Kessler Foundation (fbk-irst, Amy L. Murphy, Prof Prabal Dutta, Prof Koen Langendoen, Prof Leo Selavo
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract - Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:

SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING

by Bird Tracking, William P. Bennett, William P., Development, Deployment Of, Mobile Wireless Sensor, William P. Bennett, William P. Bennett, Adviser Mehmet, C. Vuran , 2012
"... This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reli ..."
Abstract - Add to MetaCart
This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable

3esis Supervisor Accepted by

by Audio-based Localisation, Benjamin Christopher Dalton, V. Michael, Benjamin Christopher Dalton , 2005
"... in partial ful2llment of the requirements for the degree of ..."
Abstract - Add to MetaCart
in partial ful2llment of the requirements for the degree of

USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST ’13) 215 Getting Real: Lessons in Transitioning Research Simulations into Hardware Systems

by Mohit Saxena, Yiying Zhang, Michael M. Swift, Andrea C. Arpaci-dusseau, Remzi H. Arpaci-dusseau
"... Flash-based solid-state drives have revolutionized stor-age with their high performance. Their sophisticated in-ternal mechanisms have led to a plethora of research on how to optimize applications, file systems, and internal SSD designs. Due to the closed nature of commercial de-vices though, most r ..."
Abstract - Add to MetaCart
research on the internals of an SSD, such as enhanced flash-translation layers, is performed using simulation or emulation. Without implementation in real devices, it can be difficult to judge the true benefit of the proposed designs. In this paper, we describe our efforts to implement two new SSD designs

Realization of Public M-Health Service in License-Free Spectrum

by Narjes Torabi, Student Member, Victor C. M. Leung
"... Abstract—Public m-health is a new medical service under intensive development, which provides unobtrusive monitoring of people’s health conditions from anywhere at any time to enable detection of deteriorating health conditions before severe discomfort or disability occur. A key challenge in practic ..."
Abstract - Add to MetaCart
to reduce access delay in a BAN in the presence of coexistent systems. By opportunistic extraction of idle spaces from a pool of orthogonal channels, CBAS dynamically adjusts a BAN’s channel access pattern according to the current interference environment, and improves the BAN’s visibility among coexistent

Automatic program repair with evolutionary computation,”

by Stephanie Forrest , Westley Weimer , Stephanie Forrest , Claire Le Goues , Thanhvu Nguyen - Commun. ACM, , 2010
"... Abstract There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work combining program analysis methods with evolutionary computation to automatically repair bugs in off-th ..."
Abstract - Cited by 34 (5 self) - Add to MetaCart
, their programs continue to incur the runtime overhead after the repair is effected. Another difference from our work is that their data structure repair requires formal specifications. Finally, their technique is limited to data structures and does not address the full range of logic errors. The gcd infinite

copyright by

by Chien-liang Fok, Chris Gill, Christine Julien, Caitlin Kelleher , 2009
"... Abstract: Mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are two recently-developed technologies that uniquely function without xed infrastructure support, and sense at scales, resolutions, and durations previously not possible. While both offer great potential in many applicati ..."
Abstract - Add to MetaCart
in these networks, and (3) the extremely limited computational and energy resources available. Until now, the burden of handling these issues was put on the software application developer. This dissertation presents three novel programming models and middleware systems that address these challenges: Limone, Agilla
Next 10 →
Results 1 - 10 of 79
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University