Sciweavers

1965 search results - page 282 / 393
» Layered Design Visualisation
Sort
View
CISS
2007
IEEE
15 years 8 months ago
Cooperation Strategies for Two Co-located receivers, with no CSI at the transmitter
— We study the case of a single transmitter, which communicates to two co-located users, through an independent block Rayleigh fading channel. The co-location nature of the users...
Amichai Sanderovich, Avi Steiner, Shlomo Shamai
140
Voted
LCN
2007
IEEE
15 years 8 months ago
Achieving True Video-on-Demand Service in Multi-Hop WiMax Mesh Networks
Abstract—In this work, we discuss how to support Video-onDemand service in multi-hop WiMax mesh networks. We are interested in the scenario that end users connect to the video se...
Fei Xie, Kien A. Hua, Ning Jiang
133
Voted
MSS
2007
IEEE
153views Hardware» more  MSS 2007»
15 years 8 months ago
Hybrid Host/Network Topologies for Massive Storage Clusters
The high demand for large scale storage capacity calls for the availability of massive storage solutions with high performance interconnects. Although cluster file systems are rap...
Asha Andrade, Ungzu Mun, Dong Hwan Chung, Alexande...
EMSOFT
2007
Springer
15 years 8 months ago
Block recycling schemes and their cost-based optimization in nand flash memory based storage system
Flash memory has many merits such as light weight, shock resistance, and low power consumption, but also has limitations like the erase-before-write property. To overcome such lim...
Jongmin Lee, Sunghoon Kim, Hunki Kwon, Choulseung ...
ASWEC
2006
IEEE
15 years 8 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...