Sciweavers

201 search results - page 5 / 41
» A Linear-System Operator Based Scheme for Evaluation of Mult...
Sort
View
SIGCOMM
1995
ACM
13 years 11 months ago
Design, Implementation, and Evaluation of a Software-Based Real-Time Ethernet Protocol
Distributedmultimedia applicationsrequire performanceguarantees from the underlying network subsystem. Ethernet has been the dominant local area network architecture in the last d...
Chitra Venkatramani, Tzi-cker Chiueh
ADC
2005
Springer
113views Database» more  ADC 2005»
14 years 1 months ago
Schemes of Storing XML Query Cache
XML query caching for XML database-backed Web applications began to be investigated recently. However, the issue of how the cached query results are stored has not been addressed ...
Hyunchul Kang, Seungchul Han, Younghyun Kim
SIAMSC
2008
143views more  SIAMSC 2008»
13 years 7 months ago
Numerical Valuation of European and American Options under Kou's Jump-Diffusion Model
Numerical methods are developed for pricing European and American options under Kou's jump-diffusion model which assumes the price of the underlying asset to behave like a ge...
Jari Toivanen
USS
2004
13 years 9 months ago
On User Choice in Graphical Password Schemes
Graphical password schemes have been proposed as an alternative to text passwords in applications that support graphics and mouse or stylus entry. In this paper we detail what is,...
Darren Davis, Fabian Monrose, Michael K. Reiter
JSAC
2011
215views more  JSAC 2011»
13 years 2 months ago
Opportunistic Spectrum Sharing Schemes for CDMA-Based Uplink MAC in Cognitive Radio Networks
—We consider a wireless cognitive radio network in which a set of secondary users (SUs) opportunistically utilize the wireless spectrum licensed to the primary users (PUs) to tra...
Xi Zhang, Hang Su