Sciweavers

8468 search results - page 1347 / 1694
» The Technology of Data Stashing
Sort
View
DSRT
2009
IEEE
15 years 6 months ago
Human Flesh Search Model Incorporating Network Expansion and GOSSIP with Feedback
—With the development of on-line forum technology and the pervasive participation of the public, the Human Flesh Search is becoming an arising phenomenon which makes a great impa...
Bing Wang, Bonan Hou, Yiping Yao, Laibin Yan
GLOBECOM
2009
IEEE
15 years 6 months ago
Scalability and Peer Churning in IP-TV: An Analytical Insight
— Peer-to-peer (P2P) technology for TV broadcasting over the Internet is becoming more and more popular in the very last years. This paper introduces a network-wide efficiency m...
Maria Luisa Merani, G. P. Leonardi, D. Saladino
ICAC
2009
IEEE
15 years 6 months ago
Out-of-band detection of boot-sequence termination events
The popularization of both virtualization and CDP technologies mean that we can now watch disk accesses of systems from entities which are not controlled by the OS. This is a rich...
Naama Parush, Dan Pelleg, Muli Ben-Yehuda, Paula T...
ICC
2009
IEEE
186views Communications» more  ICC 2009»
15 years 6 months ago
Power Allocations for Adaptive Distributed MIMO Multi-Hop Networks
—Distributed MIMO multi-hop relaying is one of the most promising technologies that permits cost-effective improvement of coverage, data rate and end-to-end (e2e) user experience...
Yidong Lang, Dirk Wübben, Karl-Dirk Kammeyer
RECONFIG
2009
IEEE
269views VLSI» more  RECONFIG 2009»
15 years 6 months ago
A 10 Gbps OTN Framer Implementation Targeting FPGA Devices
Abstract—Integrated circuits for very high-speed telecommunication protocols often use ASICs, due to their strict timing constraints. This scenario is changing, since modern FPGA...
Guilherme Guindani, Frederico Ferlini, Jeferson Ol...
« Prev « First page 1347 / 1694 Last » Next »