Sciweavers

2844 search results - page 519 / 569
» A Comparison of Partitioning Operating Systems for Integrate...
Sort
View
133
Voted
EDOC
2006
IEEE
15 years 10 months ago
Trust Assessment Using Provenance in Service Oriented Applications
Workflow forms a key part of many existing Service Oriented applications, involving the integration of services that may be made available at distributed sites. It is possible ng...
Shrija Rajbhandari, Arnaud Contes, Omer F. Rana, V...
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
15 years 10 months ago
Mobile RFID - A Case from Volvo on Innovation in SCM
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Magnus Holmqvist, Gunnar Stefansson
IEEEPACT
2006
IEEE
15 years 10 months ago
Whole-program optimization of global variable layout
On machines with high-performance processors, the memory system continues to be a performance bottleneck. Compilers insert prefetch operations and reorder data accesses to improve...
Nathaniel McIntosh, Sandya Mannarswamy, Robert Hun...
DAC
2006
ACM
15 years 10 months ago
Energy-scalable OFDM transmitter design and control
Orthogonal Frequency Division Multiplexing (OFDM) is the modulation of choice for broadband wireless communications. Unfortunately, it comes at the cost of a very low energy effic...
Björn Debaillie, Bruno Bougard, Gregory Lenoi...
ACSAC
2005
IEEE
15 years 9 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson