Sciweavers

2392 search results - page 163 / 479
» Channel-Hopping Multiple Access
Sort
View
ICS
1992
Tsinghua U.
15 years 5 months ago
Optimizing for parallelism and data locality
Previous research has used program transformation to introduce parallelism and to exploit data locality. Unfortunately,these twoobjectives have usuallybeen considered independentl...
Ken Kennedy, Kathryn S. McKinley
VLDB
1992
ACM
122views Database» more  VLDB 1992»
15 years 5 months ago
Using Flexible Transactions to Support Multi-System Telecommunication Applications
Service order provisioning is an important telecommunication application that automates the process of providing telephone services in response to the customer requests. It is an ...
Mansoor Ansari, Linda Ness, Marek Rusinkiewicz, Am...
WCNC
2010
IEEE
15 years 5 months ago
V-Tokens for Conditional Pseudonymity in VANETs
—Privacy is an important requirement in vehicle networks, because vehicles broadcast detailed location information. Also of importance is accountability due to safety critical ap...
Florian Schaub, Frank Kargl, Zhendong Ma, Michael ...
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 5 months ago
Multiuser Discrete Bit-loading for Digital Subscriber Lines
This paper proposes an efficient algorithm that produces near-optimal discrete bit-loading for a Gaussian interference channel that models a DSL network. It first takes a continuou...
David D. Yu, Kibeom Seong, John M. Cioffi
115
Voted
AINA
2010
IEEE
15 years 5 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...