Sciweavers

2407 search results - page 396 / 482
» Design considerations for network processor operating system...
Sort
View
131
Voted
TSMC
2008
140views more  TSMC 2008»
15 years 3 months ago
Adaptive Feedback Control by Constrained Approximate Dynamic Programming
A constrained approximate dynamic programming (ADP) approach is presented for designing adaptive neural network (NN) controllers with closed-loop stability and performance guarante...
S. Ferrari, J. E. Steck, R. Chandramohan
ICNP
2009
IEEE
15 years 1 months ago
A Mismatch Controller for Implementing High-Speed Rate-based Transport Protocols
End-to-end rate-based congestion control algorithms are advocated for audio/video transport over the Internet instead of window-based protocols. Once the congestion controller has ...
Luca De Cicco, Saverio Mascolo
143
Voted
MSWIM
2009
ACM
15 years 10 months ago
An enhanced mechanism for efficient assignment of multiple MBMS sessions towards LTE
The provision of rich multimedia services, such as Mobile TV, is considered of key importance for the Long Term Evolution (LTE) proliferation in mobile market. To this direction, ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
HPDC
2009
IEEE
15 years 10 months ago
TakTuk, adaptive deployment of remote executions
This article deals with TakTuk, a middleware that deploys efficiently parallel remote executions on large scale grids (thousands of nodes). This tool is mostly intended for intera...
Benoit Claudel, Guillaume Huard, Olivier Richard
126
Voted
CCS
2006
ACM
15 years 7 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang