Sciweavers

1134 search results - page 224 / 227
» Optimizing Designs based on Risk Approach
Sort
View
ASPLOS
2006
ACM
14 years 11 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
JIIS
2006
113views more  JIIS 2006»
14 years 9 months ago
Spatial ordering and encoding for geographic data mining and visualization
: Geographic information (e.g., locations, networks, and nearest neighbors) are unique and different from other aspatial attributes (e.g., population, sales, or income). It is a ch...
Diansheng Guo, Mark Gahegan
75
Voted
JSAC
2007
127views more  JSAC 2007»
14 years 9 months ago
Mechanism-based resource allocation for multimedia transmission over spectrum agile wireless networks
— We propose to add a new dimension to existing wireless multimedia systems by enabling autonomous stations to dynamically compete for communication resources through adjustment ...
Ahmad Reza Fattahi, Fangwen Fu, Mihaela van der Sc...
FOCM
2002
140views more  FOCM 2002»
14 years 9 months ago
Adaptive Wavelet Methods II - Beyond the Elliptic Case
This paper is concerned with the design and analysis of adaptive wavelet methods for systems of operator equations. Its main accomplishment is to extend the range of applicability...
Albert Cohen, Wolfgang Dahmen, Ronald A. DeVore
TJS
2010
117views more  TJS 2010»
14 years 4 months ago
Adaptive service scheduling for workflow applications in Service-Oriented Grid
When the workflow application is executed in Service-Oriented Grid (SOG), performance issues such as service scheduling should be considered, to achieve high and stable performance...
Sung-Ho Chin, Taeweon Suh, Heon-Chang Yu