Sciweavers

1524 search results - page 14 / 305
» The Bandwidth Exchange Architecture
Sort
View
ASAP
2005
IEEE
169views Hardware» more  ASAP 2005»
15 years 7 months ago
Alleviating the Data Memory Bandwidth Bottleneck in Coarse-Grained Reconfigurable Arrays
It is widely known that parallel operation execution in multiprocessor systems generates a respective increase in memory accesses. Since the memory and bus subsystems provide a li...
Grigoris Dimitroulakos, Michalis D. Galanis, Costa...
JMS
2010
139views more  JMS 2010»
15 years 11 days ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
AIL
2005
90views more  AIL 2005»
15 years 1 months ago
Towards a multi-agent system for regulated information exchange in crime investigations
This paper outlines a multi-agent architecture for regulated information exchange of crime investigation data between police forces. Interactions between police officers about info...
Pieter Dijkstra, Floris Bex, Henry Prakken, Kees d...
NGC
2002
Springer
127views Communications» more  NGC 2002»
15 years 1 months ago
Core Stateless Fair Bandwidth Allocation for Unicast and Multicast Flows
In this paper we aim at developing a solution to fairly allocating bandwidth among unicast and multicast flows. For this purpose, we propose the anycast max-min fairness criterion,...
Albert Banchs, Frederic Raspall, David Anguera, Se...
190
Voted
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 5 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis