Sciweavers

6404 search results - page 1220 / 1281
» Blocks
Sort
View
FAST
2003
13 years 9 months ago
Semantically-Smart Disk Systems
We propose and evaluate the concept of a semantically-smart disk system (SDS). As opposed to a traditional “smart” disk, an SDS has detailed knowledge of how the file system ...
Muthian Sivathanu, Vijayan Prabhakaran, Florentina...
NIPS
2004
13 years 9 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 9 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
ICWN
2003
13 years 9 months ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inef...
Sooksan Panichpapiboon, Jon M. Peha
IM
2003
13 years 9 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...
« Prev « First page 1220 / 1281 Last » Next »