Sciweavers

507 search results - page 65 / 102
» Measurement, Analysis and Modeling of RTOS System Calls Timi...
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
14 years 4 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
SIGIR
2008
ACM
14 years 9 months ago
User adaptation: good results from poor systems
Several recent studies have found only a weak relationship between the performance of a retrieval system and the "success" achievable by human searchers. We hypothesize ...
Catherine L. Smith, Paul B. Kantor
HPDC
2008
IEEE
14 years 9 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
TIME
1997
IEEE
15 years 1 months ago
On Effective Data Clustering in Bitemporal Databases
Temporal databases provide built-in supports for efficient recording and querying of time-evolving data. In this paper, data clustering issues in temporal database environment are...
Jong Soo Kim, Myoung-Ho Kim
CAD
2005
Springer
14 years 9 months ago
Efficiency of boundary evaluation for a cellular model
Feature modeling systems usually employ a boundary representation (b-rep) to store the shape information on a product. It has, however, been shown that a b-rep has a number of sho...
Rafael Bidarra, Joaquim Madeira, Willem J. Neels, ...