Sciweavers

2407 search results - page 384 / 482
» Design considerations for network processor operating system...
Sort
View
148
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Near-Optimal Power Control in Wireless Networks: A Potential Game Approach
—We study power control in a multi-cell CDMA wireless system whereby self-interested users share a common spectrum and interfere with each other. Our objective is to design a pow...
Ozan Candogan, Ishai Menache, Asuman E. Ozdaglar, ...
152
Voted
WINET
2010
120views more  WINET 2010»
15 years 2 months ago
Link adaptation algorithms for improved delivery of delay- and error-sensitive packet-data services over wireless networks
Abstract Link Adaptation is a radio resource management technique that assesses the channel conditions and selects a transport mode, from a set of possible options, which is optimi...
Miguel López-Benítez, Javier Goz&aac...
117
Voted
FAST
2003
15 years 5 months ago
Pond: The OceanStore Prototype
OceanStore is an Internet-scale, persistent data store designed for incremental scalability, secure sharing, and long-term durability. Pond is the OceanStore prototype; it contain...
Sean C. Rhea, Patrick R. Eaton, Dennis Geels, Haki...
128
Voted
RAID
2010
Springer
15 years 2 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh
130
Voted
ACSAC
2007
IEEE
15 years 7 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby