Sciweavers

4330 search results - page 780 / 866
» Analyzing security architectures
Sort
View
117
Voted
TC
2008
15 years 3 months ago
Analysis of Mask-Based Nanowire Decoders
Stochastically assembled nanoscale architectures have the potential to achieve device densities 100 times greater than today's CMOS. A key challenge facing nanotechnologies is...
Eric Rachlin, John E. Savage
142
Voted
TON
2008
131views more  TON 2008»
15 years 3 months ago
Capacity management and equilibrium for proportional QoS
Differentiated services architectures are scalable solutions for providing class-based Quality of Service (QoS) over packet switched networks. While qualitative attributes of the o...
Ishai Menache, Nahum Shimkin
130
Voted
JIB
2007
119views more  JIB 2007»
15 years 3 months ago
VINEdb: a data warehouse for integration and interactive exploration of life science data
Control of cell proliferation, differentiation, activation and cell removal is crucial for the development and existence of multi-cellular organisms. Apoptosis, or programmed cell...
Sridhar Hariharaputran, Thoralf Töpel, Bj&oum...
TWC
2008
176views more  TWC 2008»
15 years 3 months ago
Asynchronous distributed power and rate control in ad hoc networks: a game-theoretic approach
This paper analyzes distributed asynchronous power and rate control for wireless ad hoc networks. Importantly, all network transmitters are considered to be independent of any mana...
Stepán Kucera, Sonia Aïssa, Koji Yamam...
120
Voted
CCR
2002
72views more  CCR 2002»
15 years 3 months ago
Multicast Video-on-Demand services
The server's storage I/O and network I/O bandwidths are the main bottleneck of VoD service. Multicast offers an efficient means of distributing a video program to multiple cl...
Huadong Ma, Kang G. Shin