Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
In this paper, we propose a novel MAC protocol, called Quality-ofservice Guarantee Multiple Access (QGMA), in wireless local area networks to support the quality of service requir...
We propose a novel model of visual contrast measurement based on segregated ON and OFF pathways. Two driving forces have shaped our investigation: (1) establishing a mechanism sele...
Due to the ever-widening performance gap between processors and disks, I/O operations tend to become the major performance bottleneck of data-intensive applications on modern clus...
Yifeng Zhu, Hong Jiang, Xiao Qin, Dan Feng, David ...
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...