Sciweavers

369 search results - page 66 / 74
» A High Performance Totally Ordered Multicast Protocol
Sort
View
CCS
2004
ACM
14 years 1 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
GLVLSI
2007
IEEE
158views VLSI» more  GLVLSI 2007»
13 years 9 months ago
RT-level vector selection for realistic peak power simulation
We present a vector selection methodology for estimating the peak power dissipation in a CMOS logic circuit. The ultimate goal is to combine the speed of RT-level simulation with ...
Chia-Chien Weng, Ching-Shang Yang, Shi-Yu Huang
CCGRID
2010
IEEE
13 years 9 months ago
An MPI-Stream Hybrid Programming Model for Computational Clusters
The MPI programming model hides network type and topology from developers, but also allows them to seamlessly distribute a computational job across multiple cores in both an intra ...
Emilio Pasquale Mancini, Gregory Marsh, Dhabaleswa...
INFOCOM
2006
IEEE
14 years 1 months ago
The Internet Dark Matter - on the Missing Links in the AS Connectivity Map
Abstract— The topological structure of the Internet infrastructure is an important and interesting subject that attracted significant research attention in the last few years. A...
Rami Cohen, Danny Raz
TCSV
2002
99views more  TCSV 2002»
13 years 7 months ago
Low-delay and error-robust wireless video transmission for video communications
Video communications over wireless networks often suffer from various errors. In this paper, a novel video transmission architecture is proposed to meet the low-delay and error-rob...
Tu-Chih Wang, Hung-Chi Fang, Liang-Gee Chen