This paper analyzes an Intel Pentium 4 hyper-threading processor. The focus is to understand its performance and the underlying reasons behind that performance. Particular attenti...
114 views105 votes15 years 8 months ago WETICE 2003»
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
131 views103 votes15 years 9 months ago ICDE 2006»
The resource lookup requirements in applications such as web caching, web content search, content distribution, resource sharing, network monitoring and management, and e-commerce...
121 views143 votes15 years 8 months ago ICDCS 2002»
In this paper, we focus our attention on the problem of automating the addition of failsafe fault-tolerance where fault-tolerance is added to an existing (fault-intolerant) progra...
131 views158 votes15 years 6 months ago ICPR 2000»
Textures are one of the basic features in visual searching and computational vision. In the literature, most of the attention has been focussed on the texture features with minima...
124 views97 votes15 years 12 months ago SOFSEM 2010»
Clock synchronization is one of the most basic building blocks for many applications in computer science and engineering. The purpose of clock synchronization is to provide the con...
Decentralized diagnosis of discrete event systems has received a lot of attention to deal with distributed systems or with systems that may be too large to be diagnosed by one cen...
Abstract. The distribution of ideal class groups of Fq(T, M(T)) is examined for degree-four monic polynomials M Fq[T] when Fq is a finite field of characteristic greater than 3 wi...
131 views125 votes15 years 9 months ago ICMCS 2006»
Media distribution through application-layer overlay networks has received considerable attention recently, owing to its flexibility and readily deployable nature. On-demand stre...
Digital Rights Management (DRM) technology ensures protection of rights on distributed music over the Internet. Existing DRM systems emphasize the protection on Businessto-Consume...