Sciweavers

726 search results - page 126 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
TMC
2008
134views more  TMC 2008»
13 years 7 months ago
A Hybrid Token-CDMA MAC Protocol for Wireless Ad Hoc Networks
Token passing medium access control (MAC) protocols are gaining interest amongst wireless ad hoc network researchers as they provide unrivalled advantages over the existing IEEE 80...
I-Sheng Liu, Fambirai Takawira, Hong-Jun Xu
PVLDB
2010
166views more  PVLDB 2010»
13 years 6 months ago
Towards Elastic Transactional Cloud Storage with Range Query Support
Cloud storage is an emerging infrastructure that offers Platforms as a Service (PaaS). On such platforms, storage and compute power are adjusted dynamically, and therefore it is i...
Hoang Tam Vo, Chun Chen, Beng Chin Ooi
CI
2004
99views more  CI 2004»
13 years 7 months ago
Purpose-Based Expert Finding in a Portfolio Management System
Most of the research inthe area of expert finding focuses on creating and maintaining centralized directories of experts' profiles, which users can search on demand. However, ...
Xiaolin Niu, Gordon I. McCalla, Julita Vassileva
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl
ICS
2003
Tsinghua U.
14 years 1 months ago
Inferential queueing and speculative push for reducing critical communication latencies
Communication latencies within critical sections constitute a major bottleneck in some classes of emerging parallel workloads. In this paper, we argue for the use of Inferentially...
Ravi Rajwar, Alain Kägi, James R. Goodman