Sciweavers

1818 search results - page 235 / 364
» How users use access control
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
A Distributed Optimization Algorithm for Multi-Hop Cognitive Radio Networks
Cognitive radio (CR) is a revolution in radio technology and is viewed as an enabling technology for dynamic spectrum access. This paper investigates how to design distributed alg...
Yi Shi, Y. Thomas Hou
SMC
2007
IEEE
137views Control Systems» more  SMC 2007»
15 years 10 months ago
Cooperative mixed strategy for service selection in service oriented architecture
—In Service Oriented Architecture (SOA), service brokers could find many service providers which offer same function with different quality of service (QoS). Under this condition...
Yimin Shen, Yushun Fan
PVLDB
2008
163views more  PVLDB 2008»
15 years 3 months ago
AlvisP2P: scalable peer-to-peer text retrieval in a structured P2P network
In this paper we present the AlvisP2P IR engine, which enables efficient retrieval with multi-keyword queries from a global document collection available in a P2P network. In such...
Toan Luu, Gleb Skobeltsyn, Fabius Klemm, Maroje Pu...
MICRO
2010
IEEE
121views Hardware» more  MICRO 2010»
15 years 2 months ago
Probabilistic Distance-Based Arbitration: Providing Equality of Service for Many-Core CMPs
Abstract--Emerging many-core chip multiprocessors will integrate dozens of small processing cores with an on-chip interconnect consisting of point-to-point links. The interconnect ...
Michael M. Lee, John Kim, Dennis Abts, Michael R. ...
SAIG
2000
Springer
15 years 8 months ago
Pragmatic Aspects of Reusable Program Generators
When writing a program generator requires considerable intellectual effort, it is valuable to amortize that effort by using the generator to build more than one application. When ...
Norman Ramsey