Sciweavers

5451 search results - page 910 / 1091
» Typed Operational Semantics
Sort
View
NCA
2008
IEEE
15 years 10 months ago
Flexible Parameterization of XOR based Codes for Distributed Storage
Distributed storage systems apply erasure-tolerant codes to guarantee reliable access to data despite failures of storage resources. While many codes can be mapped to XOR operatio...
Peter Sobe, Kathrin Peter
PIMRC
2008
IEEE
15 years 10 months ago
Engineering wireless mesh networks
Abstract—Wireless mesh networks are considered as a potential attractive alternative to provide broadband access to users. They have been studied extensively by the research comm...
Catherine Rosenberg, Jun Luo, André Girard
115
Voted
SASP
2008
IEEE
101views Hardware» more  SASP 2008»
15 years 10 months ago
Custom Processor Core Construction from C Code
—In this paper we present a method for construction of application specific processor cores from a given C code. Our approach consists of three phases. We start by quantifying t...
Jelena Trajkovic, Daniel D. Gajski
ACISP
2008
Springer
15 years 10 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong
116
Voted
ADHOCNOW
2008
Springer
15 years 10 months ago
Novel Algorithms for the Network Lifetime Problem in Wireless Settings
Abstract. A wireless ad-hoc network is a collection of transceivers positioned in the plane. Each transceiver is equipped with a limited, nonreplenishable battery charge. The batte...
Michael Elkin, Yuval Lando, Zeev Nutov, Michael Se...