Sciweavers

323 search results - page 56 / 65
» Doing it right
Sort
View
ASPLOS
2006
ACM
15 years 1 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
JAC
2008
15 years 1 months ago
Rule 110: universality and catenations
Cellular automata are a simple model of parallel computation. Many people wonder about the computing power of such a model. Following an idea of S. Wolfram [16], M. Cook [3] has pr...
Gaétan Richard
IC
2004
15 years 1 months ago
An Efficient TCP Buffer Tuning Technique Based on Packet Loss Ratio (TBT-PLR)
The existing TCP (Transmission Control Protocol) is known to be unsuitable for a network with the characteristics of high BDP (Bandwidth-Delay Product) because of the fixed small o...
Gi-chul Yoo, Eun-sook Sim, Dongkyun Kim, Taeyoung ...
IAAI
2001
15 years 1 months ago
TALPS: The T-AVB Automated Load Planning System
Due to military drawdowns and the need for additional transportation lift requirements, the US MARINE CORPS developed a concept wherein they had modified a commercial container sh...
Paul S. Cerkez
IAAI
2003
15 years 1 months ago
A Cellular Telephone-Based Application for Skin-Grading to Support Cosmetic Sales
We have developed a sales support system for door-todoor sales of cosmetics based on a skin-image grading system called Skin-CRM (Skin Customer Relationship Management). Our Skin-...
Hironori Hiraishi, Fumio Mizoguchi