標(biāo)題: Titlebook: Reliable and Autonomous Computational Science; International Confer Sung Y. Shin,Rex Gantenbein,Jiman Hong Conference proceedings 2010 Spri [打印本頁(yè)] 作者: FETUS 時(shí)間: 2025-3-21 18:55
書目名稱Reliable and Autonomous Computational Science影響因子(影響力)
書目名稱Reliable and Autonomous Computational Science影響因子(影響力)學(xué)科排名
書目名稱Reliable and Autonomous Computational Science網(wǎng)絡(luò)公開度
書目名稱Reliable and Autonomous Computational Science網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Reliable and Autonomous Computational Science被引頻次
書目名稱Reliable and Autonomous Computational Science被引頻次學(xué)科排名
書目名稱Reliable and Autonomous Computational Science年度引用
書目名稱Reliable and Autonomous Computational Science年度引用學(xué)科排名
書目名稱Reliable and Autonomous Computational Science讀者反饋
書目名稱Reliable and Autonomous Computational Science讀者反饋學(xué)科排名
作者: GEAR 時(shí)間: 2025-3-21 21:54
A Medical Device Safety Supervision over Wirelesst automatically generates the safety engine to guarantee given safety requirements and . an abstracted application development environment so that applications can be developed independent of underlying complications of wireless communication. To mitigate negative effects due to packet losses, the P作者: Omnipotent 時(shí)間: 2025-3-22 02:27
A Novel Memory-Aware CPU Allocation Policy for Multicore NUMA Architecturechically and adaptively according to the types of CPU allocation requests. Finally, it utilizes the characteristics of processes such as CPU intensity and memory intensity to accurately estimate the CPU and memory load of each core. Real implementation based experimental results have shown that the 作者: 內(nèi)部 時(shí)間: 2025-3-22 07:59 作者: 昏暗 時(shí)間: 2025-3-22 12:15
PDF: A Novel Probability-based Data Forwarding Scheme in Lossy Wireless Sensor Networksesults demonstrate that the proposed PDF scheme can save much energy and significantly increases the energy efficiency compared to the pure-ACK-based scheme when both schemes use the two well-known data forwarding metrics, . and NADV, in the network layer by up to 140.50% and 57.55%, respectively.作者: Eosinophils 時(shí)間: 2025-3-22 14:05
Design of a reliability enhancement scheme for the grid-topology mesh networkthe conventional standard. Through the slots inevitably wasted due to the channel error in the previous slots, the stored message is retransmitted according to the distance to the controller. Simulation results show that the proposed scheduling scheme can enhance the delivery success ratio by up to 作者: Yag-Capsulotomy 時(shí)間: 2025-3-22 20:18
An Efficient and Reliable flooding in MANETstwork overhead, our mechanism dynamically adjusts the redundancy according to network conditions. Simulation results show that our mechanism provides both increased reliability and energy-efficiency compared to the existing flooding mechanisms.作者: 定點(diǎn) 時(shí)間: 2025-3-22 21:25
Protection against Buffer Overflow Attacks via Dynamic Binary Translatione performance degradation ranged from 11.2% to 41% for realistic applications, which was 11 times less than a compiler-based solution such as Read-Only RAR. The performance of our mechanism and its applicability on various platforms make it an effective and viable solution for end users.作者: 符合規(guī)定 時(shí)間: 2025-3-23 03:01 作者: AWE 時(shí)間: 2025-3-23 07:50
1846) - ein ?konom mit Weitblick und sozialer Verantwortung (Biografie), "Friedrich List im Zeitalter der Globalisierung" (Erg?nzungsband) und "Politik der Zukunft" ( Erg?nzungsband) hervorragend und stellt insbesondere eine wichtige Fortsetzung seines zuletzt erschienenen Bandes "Politik der Zukunft" dar..978-3-658-16576-5作者: 細(xì)微差別 時(shí)間: 2025-3-23 11:39 作者: 反復(fù)拉緊 時(shí)間: 2025-3-23 17:21 作者: 干涉 時(shí)間: 2025-3-23 18:13 作者: Enrage 時(shí)間: 2025-3-24 00:12
Bongjae Kim,Boncheol Gu,Jeongki Kim,Chaedeok Lim,Jiman Hong den Gang der Forschung, sondern ebenso ein Stück Geistesgeschichte im Spiegel der Nietzsche-Wirkung. Es gibt zwar Deutungen sehr verschiedenen Ranges, aber es ist unnütz, die eine richtig, die andere falsch zu nennen; jede hat, von ihrem Blickpunkt aus gesehen, mehr oder weniger recht.作者: hieroglyphic 時(shí)間: 2025-3-24 04:49
Jinman Jung,Yookun Cho,Yeongkwun Kim,Sangho Yi,Hyungbae Park den Gang der Forschung, sondern ebenso ein Stück Geistesgeschichte im Spiegel der Nietzsche-Wirkung. Es gibt zwar Deutungen sehr verschiedenen Ranges, aber es ist unnütz, die eine richtig, die andere falsch zu nennen; jede hat, von ihrem Blickpunkt aus gesehen, mehr oder weniger recht.作者: 暫時(shí)休息 時(shí)間: 2025-3-24 10:16 作者: 蛙鳴聲 時(shí)間: 2025-3-24 12:34
A Distributed Two-Version Multi-Granularity Locking Protocol for Multi-Controller Storage Systems this paper, a two-version multi-granularity protocol is proposed to maximize the controller concurrency of storage systems and to improve system performance. The concept of multi-granularity is explored in this paper by considering the hierarchical structure of such systems using stripes, blocks, e作者: obtuse 時(shí)間: 2025-3-24 18:54
A Medical Device Safety Supervision over Wirelessors during medical procedures. Caregivers, as end users, strongly prefer the use of wireless networks for such interconnections between clinical devices due to its seamless connectivity and ease of use/maintenance. In [KSM.10], we introduced a Network-Aware Safety Supervisior framework to integrate 作者: Confound 時(shí)間: 2025-3-24 19:35
A Novel Memory-Aware CPU Allocation Policy for Multicore NUMA Architectureex-A9. Also, to reduce bus contention among multiple cores and DRAMs, they adopt the NUMA (Non-Uniform Memory Access) memory organization, wherein each core has direct path to its own local memory, leading to access local memory faster than remote memory. These trends of computer architecture trigge作者: Gratuitous 時(shí)間: 2025-3-25 02:37 作者: Hemodialysis 時(shí)間: 2025-3-25 03:36 作者: 誘使 時(shí)間: 2025-3-25 09:01 作者: 蕨類 時(shí)間: 2025-3-25 12:06
A Reliable Nested Transaction Model with Extension of Real-Time Characteristicsplex and more distributed, a concept of nested transactions proposed by Moss are needed to provide flexibility and performance in distributed complex and dynamic systems. Mosss model is extended to hard real-time systems by the addition of explicit timing constraints. Though the model allows multipr作者: 仲裁者 時(shí)間: 2025-3-25 19:15
PDF: A Novel Probability-based Data Forwarding Scheme in Lossy Wireless Sensor Networksased on a hop-by-hop ACK-based retransmission mechanism. However, these schemes may waste a considerable amount of energy for data transmissions, especially when the link quality is low for ACK transmissions. This paper proposes a novel . (PDF) scheme to minimize the energy consumption for unnecessa作者: 6Applepolish 時(shí)間: 2025-3-26 00:01 作者: 盲信者 時(shí)間: 2025-3-26 04:09
Design of a reliability enhancement scheme for the grid-topology mesh networkness of control applications by the reliable transmission of monitor and control messages. Targeting at the slot-based WirelessHART protocol, the joint routing and scheduling scheme decides the route between the controller and each node, allocating time slots using well-known Dijkstra’s algorithm. A作者: micturition 時(shí)間: 2025-3-26 07:14
A Reliable Watchdog Protocol with Two-way Mutual Confirmation in Wireless Multi-Hop Networkso wave, a data packet can be easily captured by unintended nodes. In addition, those unintended and malicious nodes can drop or modify the data packet. Hence, a watchdog protocol is required to handle those malicious attacks. In this paper, we therefore propose a reliable watchdog protocol at MAC la作者: 粘 時(shí)間: 2025-3-26 08:54 作者: 蝕刻 時(shí)間: 2025-3-26 16:04
An Efficient and Reliable flooding in MANETsreliable and energy-efficient flooding mechanisms have been developed in recent years. However, an appropriate mechanism which considers dynamic topology changes in MANETs has yet to be developed. Thus, in this paper, we propose an efficient and reliable flooding mechanism. The proposed mechanism us作者: 災(zāi)禍 時(shí)間: 2025-3-26 17:32
A Fast Agreement Protocol for Underwater Wireless Sensor Networksads manage and monitor their member nodes. When a cluster head fails, all member nodes detect and notify their neighbor nodes of the cluster head failure to avoid wasting energy caused by communication with the failed cluster head. Member nodes detect the failure of a cluster head using agreement pr作者: CROAK 時(shí)間: 2025-3-26 21:59 作者: debase 時(shí)間: 2025-3-27 01:26
Protection against Buffer Overflow Attacks via Dynamic Binary Translationh the source codes, rebuild programs, modify the operating system or the augments of hardware architecture, and thus often result in performance degradation or restricted applicability. This paper proposes to protect a system from buffer overflow attacks with a mechanism based on dynamic binary tran作者: acrimony 時(shí)間: 2025-3-27 06:07
A Distributed Two-Version Multi-Granularity Locking Protocol for Multi-Controller Storage Systemstc. Synchronization based on two versions of data is adopted to favor read operations. The proposed protocol is evaluated over realistic traces with different configurations, such as using varying number of controllers and different disk performance model.作者: Circumscribe 時(shí)間: 2025-3-27 10:13 作者: 陳腐思想 時(shí)間: 2025-3-27 17:33 作者: avarice 時(shí)間: 2025-3-27 19:31 作者: 行乞 時(shí)間: 2025-3-28 01:54
Thermalaware Register File based on Heat Transfermperature point. As a result, we achieved the peak temperature drop that is up to 13.5°C(13.3%) on average 9.4°C(11.3%) compared to the existing register-file. Also relative performance improvement is up to 67.7% on average 49.8%.作者: enfeeble 時(shí)間: 2025-3-28 05:09
A New Green-Scheduling Approach to Maximize Wireless Multimedia Networking Lifetime via Packet and Pr bound of multimedia distortion requirement. Simulation results demonstrate that the proposed approach can significantly improve the energy utilization balance among WMN nodes compared with traditional media-quality optimized approach, and thus significantly extending the battery powered WMN network lifetime.作者: tenuous 時(shí)間: 2025-3-28 08:02 作者: 場(chǎng)所 時(shí)間: 2025-3-28 11:36 作者: 馬籠頭 時(shí)間: 2025-3-28 16:30 作者: indigenous 時(shí)間: 2025-3-28 21:21 作者: troponins 時(shí)間: 2025-3-29 01:50
Energy Efficient Power Management for Multi-Mode Wireless Network Devicesk detection scheme that dynamically adjusts the network detection interval. We evaluated our scheme via simulation. The simulation results show that the energy consumption of our scheme is almost the same as that consumed in the optimal case under certain conditions.作者: B-cell 時(shí)間: 2025-3-29 03:29 作者: 大雨 時(shí)間: 2025-3-29 09:41 作者: PAN 時(shí)間: 2025-3-29 14:58 作者: 即席演說 時(shí)間: 2025-3-29 17:47 作者: 滲透 時(shí)間: 2025-3-29 20:12 作者: 冥想后 時(shí)間: 2025-3-30 03:05
Bongjae Kim,Boncheol Gu,Jeongki Kim,Chaedeok Lim,Jiman Hongl ist. Die Ursache liegt in den zahllosen Widersprüchen und Perspektiven des Nietzscheschen Werkes. Jeder, der sich ihm n?hert, blickt fasziniert auf das, was seinem eigenen Denken oder Wunsch entgegenkommt; er l?st wenige Teile aus dem Gesamten heraus und setzt sie zu . Nietzsche-Bild zusammen. Wie作者: 贊美者 時(shí)間: 2025-3-30 05:05 作者: Antecedent 時(shí)間: 2025-3-30 09:55
Hong Min,Sangil Eo,Joonhyouk Jang,Junyoung Heo,Gwangil Jeonnt to the end of its hero by identifying himself with Dionysos as the symbol of the eternal process of coming to be and passing away. On behalf of his decisive premisses, that after the death of God there is no difference between Good and Bad and that man is nothing than a biological creature, he in作者: 重畫只能放棄 時(shí)間: 2025-3-30 14:11
978-3-0348-0030-3Springer Basel AG 2010作者: ingenue 時(shí)間: 2025-3-30 19:00
Reliable and Autonomous Computational Science978-3-0348-0031-0Series ISSN 2504-3862 Series E-ISSN 2504-3870 作者: CONE 時(shí)間: 2025-3-30 21:22
Autonomic Systemshttp://image.papertrans.cn/r/image/826469.jpg作者: mechanism 時(shí)間: 2025-3-31 01:29 作者: CLAY 時(shí)間: 2025-3-31 07:16
Sung Y. Shin,Rex Gantenbein,Jiman HongReliability/Autonomy based Theory, Algorithms, SW Design, & Systems Systems/Networks Security Embedded/Real-Time Systems Distributed Intelligent Control/Collaborative Systems.Includes supplementary ma作者: chronicle 時(shí)間: 2025-3-31 09:31
The History of Heterostructure Lasersd using the phenomenon of injection in germanium p-n junctions for the generation and amplification of infrared radiation. This idea, which at the time was not made available to the scientific community, came much too early. Real development of the semiconductor laser was stimulated by the work of B