Sciweavers

2752 search results - page 342 / 551
» Application performance in the QLinux multimedia operating s...
Sort
View
CASES
2003
ACM
15 years 4 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
CCGRID
2003
IEEE
15 years 4 months ago
Noncontiguous I/O Accesses Through MPI-IO
I/O performance remains a weakness of parallel computing systems today. While this weakness is partly attributed to rapid advances in other system components, I/O interfaces avail...
Avery Ching, Alok N. Choudhary, Kenin Coloma, Wei-...
NETGAMES
2005
ACM
15 years 4 months ago
Packetization interval of haptic media in networked virtual environments
This paper deals with the packetization interval of haptic media in networked virtual environments. We here handle work in which a user moves an object by manipulating a haptic in...
Masaki Fujimoto, Yutaka Ishibashi
ICOIN
2001
Springer
15 years 3 months ago
Pervasive Adaptation for Mobile Computing
Mobile Computing platforms such as mobile phones, PDAs or wearable computers operate in a much more volatile and limited environment than their stationary counterparts. Such platf...
Tim Edmonds, Andy Hopper, Steve Hodges
HPCA
2008
IEEE
15 years 11 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...