Sciweavers

4330 search results - page 752 / 866
» Analyzing security architectures
Sort
View
124
Voted
MSWIM
2006
ACM
15 years 9 months ago
An efficient multicast packet delivery scheme for UMTS
In this paper we present an efficient scheme for the multicast transmission of the data in the Universal Mobile Telecommunications System (UMTS). We take advantage of the tree top...
Antonios G. Alexiou, Dimitrios Antonellis, Christo...
127
Voted
MSWIM
2006
ACM
15 years 9 months ago
Multicast in 802.11 WLANs: an experimental study
While the deployment of WiFi networks continue to grow at an explosive rate, the multicast multimedia delivery service on WiFi compliant devices is still in its early stage of dev...
Diego Dujovne, Thierry Turletti
154
Voted
PPPJ
2006
ACM
15 years 9 months ago
Enabling Java mobile computing on the IBM Jikes research virtual machine
Today’s complex applications must face the distribution of data and code among different network nodes. Java is a wide-spread language that allows developers to build complex so...
Giacomo Cabri, Letizia Leonardi, Raffaele Quitadam...
153
Voted
SI3D
2006
ACM
15 years 9 months ago
Jump flooding in GPU with applications to Voronoi diagram and distance transform
This paper studies jump flooding as an algorithmic paradigm in the general purpose computation with GPU. As an example application of jump flooding, the paper discusses a constant...
Guodong Rong, Tiow Seng Tan
130
Voted
VALUETOOLS
2006
ACM
166views Hardware» more  VALUETOOLS 2006»
15 years 9 months ago
Fairness considerations of scheduling in multi-server and multi-queue systems
— Multi-server and multi-queue architectures are common mechanisms used in a large variety of applications (call centers, Web services, computer systems). One of the major motiva...
David Raz, Benjamin Avi-Itzhak, Hanoch Levy