Sciweavers

46931 search results - page 9335 / 9387
» Networking the networks
Sort
View
MICRO
2010
IEEE
142views Hardware» more  MICRO 2010»
14 years 8 months ago
Virtual Snooping: Filtering Snoops in Virtualized Multi-cores
Virtualization has been rapidly expanding its applications in numerous server and desktop environments to improve the utilization and manageability of physical systems. Such prolif...
Daehoon Kim, Hwanju Kim, Jaehyuk Huh
124
Voted
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
14 years 8 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
PIMRC
2010
IEEE
14 years 8 months ago
An implementation of Cognitive Resource Management on LTE platform
Abstract--In this paper we describe an LTE based demonstrator of the Universal Link Layer API (ULLA) and Cognitive Resource Manager (CRM) modules that are developed in ARAGORN proj...
Tao Cai, Georgios P. Koudouridis, Johan Johansson,...
107
Voted
SAGT
2010
Springer
186views Game Theory» more  SAGT 2010»
14 years 8 months ago
On the Efficiency of Markets with Two-Sided Proportional Allocation Mechanisms
We analyze the performance of single-parameter mechanisms for markets in which there is competition amongst both consumers and suppliers (namely, two-sided markets). Specifically, ...
Volodymyr Kuleshov, Adrian Vetta
91
Voted
SECON
2010
IEEE
14 years 8 months ago
Utility-Based Gateway Deployment for Supporting Multi-Domain DTNs
Abstract--Due to technology or policy constraints, communications across network domains usually require the intervention of gateways, and their proper deployment is crucial to the...
Ting He, Kang-Won Lee, Nikoletta Sofra, Kin K. Leu...
« Prev « First page 9335 / 9387 Last » Next »