Sciweavers

1079 search results - page 195 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 7 months ago
An approach to RAID-6 based on cyclic groups of a prime order
As the size of data storing arrays of disks grows, it becomes vital to protect data against double disk failures. An economic way of providing such protection consists of adding tw...
R. Jackson, D. Rumynin, O. Zaboronski
TITB
2008
110views more  TITB 2008»
13 years 7 months ago
Context-Sensitive Correlation of Implicitly Related Data: An Episode Creation Methodology
Episode creation is the task of classifying medical events and related clinical data to high-level concepts, such as diseases. Challenges in episode creation result in part because...
Roderick Y. Son, Ricky K. Taira, Hooshang Kangarlo...
SECON
2008
IEEE
14 years 2 months ago
A Demonstration of Video over a User Centric Prioritization Scheme for Wireless LANs
—Due to the unreliable nature of the wireless medium, provisioning of the Quality of Service (QoS) in wireless LANs is by far more complicated than in wired networks. In this dem...
Konstantinos Choumas, Thanasis Korakis, Leandros T...
EUROSYS
2010
ACM
14 years 26 days ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
SENSYS
2003
ACM
14 years 1 months ago
Bandwidth management in wireless sensor networks
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
Bret Hull, Kyle Jamieson, Hari Balakrishnan