Sciweavers

4987 search results - page 156 / 998
» Fuzzifying P Systems
Sort
View
126
Voted
FAST
2008
15 years 6 months ago
TaP: Table-based Prefetching for Storage Caches
TaP is a storage cache sequential prefetching and caching technique to improve the read-ahead cache hit rate and system response time. A unique feature of TaP is the use of a tabl...
Mingju Li, Elizabeth Varki, Swapnil Bhatia, Arif M...
145
Voted
PPL
2008
101views more  PPL 2008»
15 years 3 months ago
Skeletal Parallel Programming with OCamlP3l 2.0
Parallel programming has proven to be an effective technique to improve the performance of computationally intensive applications. However, writing parallel programs is not easy, ...
Roberto Di Cosmo, Zheng Li, Susanna Pelagatti, Pie...
123
Voted
EUSFLAT
2007
176views Fuzzy Logic» more  EUSFLAT 2007»
15 years 5 months ago
Modifying the Classic Peak Picking Technique Using a Fuzzy Multi Agent to Have an Accurate P300-based BCI
EEG-based brain computer interface (BCI) provides a new communication channel between the human brain and a computer. The classification of EEG data is an important task in EEG-ba...
Gholamreza Salimi Khorshidi, Ayyoub Jaafari, Ali M...
144
Voted
ICPP
2009
IEEE
15 years 1 months ago
Mediacoop: Hierarchical Lookup for P2P-VoD Services
The random seeking in P2P-VoD system requires efficient lookup for "good" suppliers. The main challenge is that good suppliers should meet two requirements: "conten...
Tieying Zhang, Jianming Lv, Xueqi Cheng
156
Voted
CSREASAM
2006
15 years 5 months ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp