Sciweavers

1040 search results - page 63 / 208
» A Comparative Performance Evaluation of Write Barrier Implem...
Sort
View
DOLAP
2004
ACM
14 years 2 months ago
Evaluating XML-extended OLAP queries based on a physical algebra
In today’s OLAP systems, integrating fast changing data, e.g., stock quotes, physically into a cube is complex and time-consuming. The widespread use of XML makes it very possib...
Xuepeng Yin, Torben Bach Pedersen
GLOBECOM
2007
IEEE
14 years 3 months ago
The Design and Evaluation of a Wireless Sensor Network for Mine Safety Monitoring
– This paper describes a wireless sensor network for mine safety monitoring. Based on the characteristics of underground mine gallery and the requirements for mine safety monitor...
Xiaoguang Niu, Xi Huang, Ze Zhao, Yuhe Zhang, Chan...
SIGOPS
2008
116views more  SIGOPS 2008»
13 years 9 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
INFOCOM
2007
IEEE
14 years 3 months ago
An Experimental Evaluation of Voice Quality Over the Datagram Congestion Control Protocol
— Most Internet telephony applications currently use either TCP or UDP to carry their voice-over-IP (VoIP) traffic. This choice can be problematic, because TCP is not well suite...
H. Vlad Balan, Lars Eggert, Saverio Niccolini, Mar...
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 2 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore