Sciweavers

2838 search results - page 524 / 568
» Verifying Controlled Components
Sort
View
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
A High-Throughput MAC Strategy for Next-Generation WLANs
WLAN technology has been shown a revolutionary development during the last decade. Recently popularized IEEE 802.11a/gbased products can support up to 54 Mbps PHY (Physical layer)...
Seongkwan Kim, Youngsoo Kim, Sunghyun Choi, Kyungh...
DEXA
2005
Springer
148views Database» more  DEXA 2005»
15 years 10 months ago
XG: A Data-Driven Computation Grid for Enterprise-Scale Mining
In this paper we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. We show how such an architecture can be le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Wen-...
STORYTELLING
2005
Springer
15 years 10 months ago
An Emotional Architecture for Virtual Characters
This paper presents the mechanisms proposed by a generic cognitive architecture for virtual characters with emotional influenced behaviors, called cognitiva, to maintain behavior ...
Ricardo Imbert, Angélica de Antonio
CCGRID
2003
IEEE
15 years 9 months ago
Performability Evaluation of Networked Storage Systems Using N-SPEK
This paper introduces a new benchmark tool for evaluating performance and availability (performability) of networked storage systems, specifically storage area network (SAN) that...
Ming Zhang, Qing Yang, Xubin He
NCA
2003
IEEE
15 years 9 months ago
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations
Numerous research efforts have produced a large number of algorithms and mechanisms for web proxy caches. In order to build powerful web proxies and understand their performance, ...
Peter Triantafillou, Ioannis Aekaterinidis