Sciweavers

2392 search results - page 161 / 479
» Channel-Hopping Multiple Access
Sort
View
IJMMS
2007
103views more  IJMMS 2007»
15 years 1 months ago
Improving password security and memorability to protect personal and organizational information
Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method f...
Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bha...
TPDS
2008
101views more  TPDS 2008»
15 years 1 months ago
An Energy-Oriented Evaluation of Buffer Cache Algorithms Using Parallel I/O Workloads
Power consumption is an important issue for cluster supercomputers as it directly affects running cost and cooling requirements. This paper investigates the memory energy efficienc...
Jianhui Yue, Yifeng Zhu, Zhao Cai
JMM2
2007
113views more  JMM2 2007»
15 years 1 months ago
Signalling Cases and QoS Management within TISPAN NGN Residential Environments
Abstract— The TISPAN group from ETSI is currently working on the specification a Next Generation Network (NGN), based on the IP Multimedia Subsystem (IMS) as the service control...
Iván Vidal, Francisco Valera, Jaime Garc&ia...
TSP
2008
145views more  TSP 2008»
15 years 1 months ago
Multichannel ALLIANCES: A Cooperative Cross-Layer Scheme for Wireless Networks
A random access protocol named ALLIANCES was recently proposed, that achieves high throughput by resolving collisions in wireless networks. ALLIANCES exploits diversity provided b...
Lun Dong, Athina P. Petropulu
124
Voted
PROPERTYTESTING
2010
14 years 11 months ago
Transitive-Closure Spanners: A Survey
We survey results on transitive-closure spanners and their applications. Given a directed graph G = (V, E) and an integer k 1, a k-transitive-closure-spanner (k-TC-spanner) of G ...
Sofya Raskhodnikova