Sciweavers

2242 search results - page 192 / 449
» Using Simulation in Call Centers
Sort
View
USS
2004
15 years 5 months ago
Side Effects Are Not Sufficient to Authenticate Software
Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on ma...
Umesh Shankar, Monica Chew, J. D. Tygar
117
Voted
JCIT
2010
151views more  JCIT 2010»
14 years 11 months ago
A Flexible Resource Location Protocol for Peer-to-Peer Network
An important and fundamental issue in designing structured peer-to-peer networks is the tradeoff between the number of logical links and the number of hops. We present a flexible ...
Xu Xiang
JNW
2006
118views more  JNW 2006»
15 years 4 months ago
UMTS Capacity and Throughput Maximization for Different Spreading Factors
An analytical model for calculating capacity in multi-cell UMTS networks is presented. Capacity is maximized for different spreading factors and for perfect and imperfect power con...
Robert Akl, Son Nguyen
WWW
2003
ACM
16 years 4 months ago
A Light-weight, Temporary File System for Large-scale Web Servers
Several recent studies have pointed out that file I/Os can be a major performance bottleneck for some large Web servers. Large I/O buffer caches often do not work effectively for ...
Dong Li, Jun Wang
161
Voted
VL
1997
IEEE
198views Visual Languages» more  VL 1997»
15 years 8 months ago
Behavior Processors: Layers between End-Users and Java Virtual Machines
Visual programming approaches are limited in their usefulness if they do not include a profile of their users that defines exactly who is attempting to solve what kind of problems...
Alexander Repenning, Andri Ioannidou