Sciweavers

2778 search results - page 43 / 556
» Limit complexities revisited
Sort
View
VLDB
2003
ACM
141views Database» more  VLDB 2003»
15 years 10 months ago
Computing complete answers to queries in the presence of limited access patterns
In data applications such as information integration, there can be limited access patterns to relations, i.e., binding patterns require values to be specified for certain attribut...
Chen Li
DATE
2009
IEEE
118views Hardware» more  DATE 2009»
15 years 4 months ago
Limiting the number of dirty cache lines
Abstract—Caches often employ write-back instead of writethrough, since write-back avoids unnecessary transfers for multiple writes to the same block. For several reasons, however...
Pepijn J. de Langen, Ben H. H. Juurlink
ICC
2009
IEEE
200views Communications» more  ICC 2009»
15 years 4 months ago
Fast Distributed Multi-Cell Scheduling with Delayed Limited-Capacity Backhaul Links
— Both fast scheduling and spatial signal processing have proven to be capacity-increasing methods in wireless communication systems. However, when applied in the downlink of a c...
Ralf Bendlin, Yih-Fang Huang, Michel T. Ivrlac, Jo...
PIMRC
2008
IEEE
15 years 4 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
IPPS
2005
IEEE
15 years 3 months ago
The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions
Due to the increasing complexity, the behavior of large-scale distributed systems becomes difficult to predict. The ability of on-line identification and autotuning of adaptive co...
Keqiang Wu, David J. Lilja, Haowei Bai