Sciweavers

8468 search results - page 1369 / 1694
» The Technology of Data Stashing
Sort
View
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 5 months ago
Quantum Cryptography For Secure Optical Networks
Dense Wavelength Division Multiplexing optical networks transport a huge aggregate traffic exceeding Tbps per single fiber, and passive optical network technology has been extended...
Stamatios V. Kartalopoulos
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
15 years 5 months ago
Using functional independence conditions to optimize the performance of latency-insensitive systems
—In latency-insensitive design shell modules are used to encapsulate system components (pearls) in order to interface them with the given latency-insensitive protocol and dynamic...
Cheng-Hong Li, Luca P. Carloni
ICCTA
2007
IEEE
15 years 5 months ago
Point Based Representations for Hierarchical Environments
The advent of advanced graphics technologies and improved hardware has enabled the generation of highly complex models with huge number of triangles. Point-based representations a...
Kedarnath Thangudu, Lakshmi Gade, Jag Mohan Singh,...
ICDCSW
2007
IEEE
15 years 5 months ago
Exploiting Gossip for Self-Management in Scalable Event Notification Systems
1 Challenges of scale have limited the development of event notification systems with strong properties, despite the urgent demand for consistency, reliability, security, and other...
Ken Birman, Anne-Marie Kermarrec, Krzysztof Ostrow...
ICDE
2007
IEEE
121views Database» more  ICDE 2007»
15 years 5 months ago
Dispatching Hospitals Intelligently: A Service-Oriented Approach
Emergencies happen frequently and handling them effectively is necessary. In many cases, emergencies are treated by a static procedure, without considering the requirements of th...
Oguz Akgus, Serdar Torgan, Anil Gürsel, Emre ...
« Prev « First page 1369 / 1694 Last » Next »