Sciweavers

5376 search results - page 1023 / 1076
» Scalable Kernel Systems
Sort
View
PPL
2008
185views more  PPL 2008»
15 years 15 days ago
On Design and Application Mapping of a Network-on-Chip(NoC) Architecture
As the number of integrated IP cores in the current System-on-Chips (SoCs) keeps increasing, communication requirements among cores can not be sufficiently satisfied using either ...
Jun Ho Bahn, Seung Eun Lee, Yoon Seok Yang, Jungso...
127
Voted
NETWORK
2006
218views more  NETWORK 2006»
15 years 15 days ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
SIGMOD
2008
ACM
138views Database» more  SIGMOD 2008»
15 years 14 days ago
Configuration-parametric query optimization for physical design tuning
Automated physical design tuning for database systems has recently become an active area of research and development. Existing tuning tools explore the space of feasible solutions...
Nicolas Bruno, Rimma V. Nehme
110
Voted
TC
2008
15 years 14 days ago
The Synonym Lookaside Buffer: A Solution to the Synonym Problem in Virtual Caches
To support dynamic address translation in today's microprocessors, the first-level cache is accessed in parallel with a translation lookaside buffer (TLB). However, this curre...
Xiaogang Qiu, Michel Dubois
117
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 13 days ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
« Prev « First page 1023 / 1076 Last » Next »