Sciweavers

741 search results - page 124 / 149
» An Analysis of Rule Evaluation Metrics
Sort
View
IDTRUST
2010
ACM
14 years 2 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
3DIC
2009
IEEE
279views Hardware» more  3DIC 2009»
14 years 2 months ago
Compact modelling of Through-Silicon Vias (TSVs) in three-dimensional (3-D) integrated circuits
Abstract—Modeling parasitic parameters of Through-SiliconVia (TSV) structures is essential in exploring electrical characteristics such as delay and signal integrity (SI) of circ...
Roshan Weerasekera, Matt Grange, Dinesh Pamunuwa, ...
WCNC
2008
IEEE
14 years 2 months ago
Hop-by-Hop Routing Strategy for Multihop Decode-and-Forward Cooperative Networks
Abstract— In this paper, focusing on multihop decode-andforward cooperative networks, a hop-by-hop routing strategy is designed to optimize the end-to-end outage performance when...
Lu Zhang 0005, Leonard J. Cimini Jr.
QEST
2007
IEEE
14 years 2 months ago
A Productivity Centered Tools Framework for Application Performance Tuning
Our productivity centered performance tuning framework for HPC applications comprises of three main components: (1) a versatile source code, performance metrics, and performance d...
Hui-Fang Wen, Simone Sbaraglia, Seetharami Seelam,...
ICMCS
2006
IEEE
181views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Novel Distributed and Practical Incentive Mechanism for Peer to Peer Live Video Streaming
The successful deployment of peer-to-peer (P2P) live video streaming systems has practically demonstrated that it can scale to reliably support a large population of peers. Howeve...
Yun Tang, Lifeng Sun, Meng Zhang, Shiqiang Yang, Y...