• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 148,308
Next 10 →

Research and Design of Test Question Database Management System Based on the Three-Tier Structure

by Aimin Yang, Junping Wu, Lixia Wang
"... Abstract:- With the further development of computer and network technology, the test question database on the network has been gradually applied in schools and universities, which positively reduces the work volume of teachers and demonstrates a proper way to test students. This paper will introduce ..."
Abstract - Add to MetaCart
will introduce a design method of test question database management system based on the three-tier B/S structure, analyze the features of the test question database structure, and expatiate the grouping algorithmic calculation focusing on the main control parameters of knowledge points and question type data

Data mules: Modeling a three-tier architecture for sparse sensor networks

by Rahul C. Shah, Sumit Roy, Sushant Jain, Waylon Brunette - IN IEEE SNPA WORKSHOP , 2003
"... Abstract — This paper presents and analyzes an architecture that exploits the serendipitous movement of mobile agents in an environment to collect sensor data in sparse sensor networks. The mobile entities, called MULEs, pick up data from sensors when in close range, buffer it, and drop off the data ..."
Abstract - Cited by 474 (7 self) - Add to MetaCart
Abstract — This paper presents and analyzes an architecture that exploits the serendipitous movement of mobile agents in an environment to collect sensor data in sparse sensor networks. The mobile entities, called MULEs, pick up data from sensors when in close range, buffer it, and drop off the data to wired access points when in proximity. This leads to substantial power savings at the sensors as they only have to transmit over a short range. Detailed performance analysis is presented based on a simple model of the system incorporating key system variables such as number of MULEs, sensors and access points. The performance metrics observed are the data success rate (the fraction of generated data that reaches the access points) and the required buffer capacities on the sensors and the MULEs. The modeling along with simulation results can be used for further analysis and provide certain guidelines for deployment of such systems. I.

Three-Tiered Specification of Micro-Architectures

by Vasu Alagar, Ralf Lämmel
"... A three-tiered language for the specification of micro-architectures is developed. (i) The structural and invariant properties to be maintained in the collaboration among the objects in the micro-architecture are specified in the lowest tier. (ii) The behaviour of the object methods in the classe ..."
Abstract - Add to MetaCart
A three-tiered language for the specification of micro-architectures is developed. (i) The structural and invariant properties to be maintained in the collaboration among the objects in the micro-architecture are specified in the lowest tier. (ii) The behaviour of the object methods

An Integrated Three-Tier Logistics Model

by Sarawoot Chittratanawat And, James S. Noble
"... A three-tier logistics/production model is developed that addresses the integration of suppliers, manufacturers and distribution. The model can be applied at either micro (within facility) or macro (between facilities) levels. The multi-echelon problem is formulated to minimize overall inventory and ..."
Abstract - Add to MetaCart
A three-tier logistics/production model is developed that addresses the integration of suppliers, manufacturers and distribution. The model can be applied at either micro (within facility) or macro (between facilities) levels. The multi-echelon problem is formulated to minimize overall inventory

Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload

by Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan , 2003
"... Peer-to-peer (P2P) file sharing accounts for an astonishing volume of current Internet tra#c. This paper probes deeply into modern P2P file sharing systems and the forces that drive them. By doing so, we seek to increase our understanding of P2P file sharing workloads and their implications for futu ..."
Abstract - Cited by 486 (7 self) - Add to MetaCart
for future multimedia workloads. Our research uses a three-tiered approach. First, we analyze a 200-day trace of over 20 terabytes of Kazaa P2P tra#c collected at the University of Washington. Second, we develop a model of multimedia workloads that lets us isolate, vary, and explore the impact of key system

A Three-Tier Asynchronous FPGA

by David Fang, Song Peng, Chris Lafrieda, Rajit Manohar
"... Field programmable gate arrays (FPGA) are widely used for their versatility and programmability in place of custom-designed circuits. Their flexibility comes at a cost of density: supporting programmable logic incurs a significant overhead in configuration logic and interconnect, relative to custom ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
in performance over their synchronous counterparts. In this paper, we present the design of a 3D AFPGA, fabricated in MIT-LL’s 3D (3-tier).18µm SOI technology. The logical resources for the 3D AFPGA were kept the same as the original 2D design, while the switch boxes were expanded with inter-layer channels

Hierarchically Classifying Documents Using Very Few Words

by Daphne Koller, Mehran Sahami , 1997
"... The proliferation of topic hierarchies for text documents has resulted in a need for tools that automatically classify new documents within such hierarchies. Existing classification schemes which ignore the hierarchical structure and treat the topics as separate classes are often inadequate in text ..."
Abstract - Cited by 521 (8 self) - Add to MetaCart
The proliferation of topic hierarchies for text documents has resulted in a need for tools that automatically classify new documents within such hierarchies. Existing classification schemes which ignore the hierarchical structure and treat the topics as separate classes are often inadequate in text

Routing Techniques in Wireless Sensor Networks: A Survey

by Jamal N. Al-karaki, Ahmed E. Kamal - IEEE Wireless Communications , 2004
"... Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. The focus, howeve ..."
Abstract - Cited by 704 (2 self) - Add to MetaCart
survey of different routing techniques. Overall, the routing techniques are classified into three categories based on the underlying network structure: flat, hierarchical, and location-based routing. Furthermore, these protocols can be classified into multipath-based, query-based, negotiation-based, Qo

Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software

by James Newsome, Dawn Song - In Network and Distributed Systems Security Symposium , 2005
"... Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause millions of dollars of damage [32, 51]. To successfully combat these fast automatic Internet attacks, we nee ..."
Abstract - Cited by 634 (30 self) - Add to MetaCart
positives for any of the many different programs that we tested. Further, we show how we can use a two-tiered approach to build a hybrid exploit detector that enjoys the same accuracy as TaintCheck but have extremely low performance overhead. Finally, we propose a new type of automatic signature generation

The Anatomy of a Context-Aware Application

by Andy Harter, Andy Hopper, Pete Steggles, Andy Ward, Paul Webster - WIRELESS NETWORKS, VOL , 1999
"... We describe a platform for context-aware computing which enables applications to follow mobile users as they move around a building. The platform is particularly suitable for richly equipped, networked environments. The only item a user is required to carry is a small sensor tag, which identifies th ..."
Abstract - Cited by 532 (3 self) - Add to MetaCart
them to the system and locates them accurately in three dimensions. The platform builds a dynamic model of the environment using these location sensors and resource information gathered by telemetry software, and presents it in a form suitable for application programmers. Use of the platform
Next 10 →
Results 1 - 10 of 148,308
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University