Sciweavers

15782 search results - page 2961 / 3157
» Network Optimization and Control
Sort
View
168
Voted
CORR
2011
Springer
199views Education» more  CORR 2011»
14 years 7 months ago
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay base...
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, S...
153
Voted
EUROSYS
2011
ACM
14 years 7 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
159
Voted
FPGA
2012
ACM
300views FPGA» more  FPGA 2012»
13 years 11 months ago
Reducing the cost of floating-point mantissa alignment and normalization in FPGAs
In floating-point datapaths synthesized on FPGAs, the shifters that perform mantissa alignment and normalization consume a disproportionate number of LUTs. Shifters are implemente...
Yehdhih Ould Mohammed Moctar, Nithin George, Hadi ...
195
Voted
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
13 years 11 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
169
Voted
PODC
2012
ACM
13 years 6 months ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
« Prev « First page 2961 / 3157 Last » Next »