Sciweavers

5523 search results - page 967 / 1105
» Improving application performance with hardware data structu...
Sort
View
ISCC
2003
IEEE
15 years 9 months ago
Payload analysis of anonymous communication system with host-based rerouting mechanism
Host-based rerouting mechanism is a routing scheme that stores and forwards data in application layer. With this, users can communicate in a indirect way. Thus, identity informati...
Hongfei Sui, Jianer Chen, Songqiao Chen, Jianxin W...
VRST
1999
ACM
15 years 8 months ago
Testbed evaluation of virtual environment interaction techniques
As immersive virtual environment (VE) applications become more complex, it is clear that we need a rm understanding of the principles of VE interaction. In particular, designers n...
Doug A. Bowman, Donald B. Johnson, Larry F. Hodges
JNW
2006
120views more  JNW 2006»
15 years 4 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
TWC
2010
14 years 11 months ago
A Multimedia Cross-Layer Protocol for Underwater Acoustic Sensor Networks
Underwater multimedia acoustic sensor networks will enable new underwater applications such as multimedia coastal and tactical surveillance, undersea explorations, picture and vide...
Dario Pompili, Ian F. Akyildiz
ISLPED
2004
ACM
137views Hardware» more  ISLPED 2004»
15 years 9 months ago
Location cache: a low-power L2 cache system
While set-associative caches incur fewer misses than directmapped caches, they typically have slower hit times and higher power consumption, when multiple tag and data banks are p...
Rui Min, Wen-Ben Jone, Yiming Hu