Sciweavers

1998 search results - page 338 / 400
» A Hardware Implementation of PRAM and Its Performance Evalua...
Sort
View
ICNP
2006
IEEE
14 years 4 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
DSN
2005
IEEE
14 years 3 months ago
Lumping Matrix Diagram Representations of Markov Models
Continuous-time Markov chains (CTMCs) have been used successfully to model the dependability and performability of many systems. Matrix diagrams (MDs) are known to be a space-efï¬...
Salem Derisavi, Peter Kemper, William H. Sanders
AVBPA
2005
Springer
308views Biometrics» more  AVBPA 2005»
14 years 3 months ago
Biometric Recognition Using Feature Selection and Combination
Most of the prior work in biometric literature has only emphasized on the issue of feature extraction and classification. However, the critical issue of examining the usefulness of...
Ajay Kumar, David Zhang
HIPC
2005
Springer
14 years 3 months ago
Preemption Adaptivity in Time-Published Queue-Based Spin Locks
Abstract. The proliferation of multiprocessor servers and multithreaded applications has increased the demand for high-performance synchronization. Traditional scheduler-based lock...
Bijun He, William N. Scherer III, Michael L. Scott
ATAL
2004
Springer
14 years 3 months ago
Learning User Preferences for Wireless Services Provisioning
The problem of interest is how to dynamically allocate wireless access services in a competitive market which implements a take-it-or-leave-it allocation mechanism. In this paper ...
George Lee, Steven Bauer, Peyman Faratin, John Wro...