Sciweavers

8190 search results - page 1591 / 1638
» From Timed to Hybrid Systems
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 8 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
CODES
2007
IEEE
15 years 8 months ago
Three-dimensional multiprocessor system-on-chip thermal optimization
3D stacked wafer integration has the potential to improve multiprocessor system-on-chip (MPSoC) integration density, performance, and power efficiency. However, the power density...
Chong Sun, Li Shang, Robert P. Dick
GLOBECOM
2007
IEEE
15 years 8 months ago
A New Stochastic Admission Control Scheme for Wireless Networks
— In traditional call admission control (CAC) schemes, mobile users are always the passive roles during the admission procedures and the base station determines whether to admit o...
Xinbing Wang, Chen Zhuo, Youyun Xu, Ruhai Wang
GRC
2007
IEEE
15 years 8 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
IPPS
2007
IEEE
15 years 8 months ago
A Performance Prediction Framework for Grid-Based Data Mining Applications
For a grid middleware to perform resource allocation, prediction models are needed, which can determine how long an application will take for completion on a particular platform o...
Leonid Glimcher, Gagan Agrawal
« Prev « First page 1591 / 1638 Last » Next »