Sciweavers

3733 search results - page 603 / 747
» Performance Evaluation of an Operating System Transaction Ma...
Sort
View
ICDE
2009
IEEE
130views Database» more  ICDE 2009»
16 years 3 months ago
Recursive Computation of Regions and Connectivity in Networks
In recent years, the data management community has begun to consider situations in which data access is closely tied to network routing and distributed acquisition: examples includ...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...
EH
2004
IEEE
117views Hardware» more  EH 2004»
15 years 5 months ago
Multi-objective Optimization of a Parameterized VLIW Architecture
The use of Application Specific Instruction-set Processors (ASIP) in embedded systems is a solution to the problem of increasing complexity in the functions these systems have to ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
83
Voted
PERCOM
2005
ACM
16 years 1 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
ICDCS
2009
IEEE
15 years 10 months ago
ISP Friend or Foe? Making P2P Live Streaming ISP-Aware
Abstract: Current peer-to-peer systems are network-agnostic, often generating large volumes of unnecessary inter-ISP traffic. Although recent work has shown the benefits of ISP-a...
Fabio Picconi, Laurent Massoulié
SIPS
2007
IEEE
15 years 7 months ago
Layered Steered Space-Time Codes Using Iterative Detection
— This paper presents a novel multifunctional multiple-input multiple-output (MIMO) scheme that combines the benefits of the Vertical Bell Labs Layered Space-Time (VBLAST) schem...
Mohammed El-Hajjar, Osamah Alamri, Lajos Hanzo