Sciweavers

6709 search results - page 1290 / 1342
» Performance Modelling of the Computational Hardware: A Stati...
Sort
View
PPNA
2011
14 years 7 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
118
Voted
CIKM
2011
Springer
14 years 16 days ago
Lower-bounding term frequency normalization
In this paper, we reveal a common deficiency of the current retrieval models: the component of term frequency (TF) normalization by document length is not lower-bounded properly;...
Yuanhua Lv, ChengXiang Zhai
110
Voted
RTSS
2005
IEEE
15 years 6 months ago
Multi-Granularity Resource Reservations
Resource reservation has been recently supported by many real-time operating systems to provide applications with guaranteed and timely access to system resources. Typically, rese...
Saowanee Saewong, Ragunathan Rajkumar
ICCS
2005
Springer
15 years 6 months ago
Flamelet Analysis of Turbulent Combustion
Three-dimensional direct numerical simulations are performed of turbulent combustion of initially spherical flame kernels. The chemistry is described by a progress variable which ...
R. J. M. Bastiaans, S. M. Martin, H. Pitsch, J. A....
MOBIHOC
2007
ACM
16 years 4 days ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi
« Prev « First page 1290 / 1342 Last » Next »