Sciweavers

8243 search results - page 1525 / 1649
» Can We Manage Trust
Sort
View
COMCOM
2006
105views more  COMCOM 2006»
13 years 9 months ago
An observation-based approach towards self-managing web servers
As more business applications have become web enabled, the web server architecture has evolved to provide performance isolation, service differentiation, and QoS guarantees. Vario...
Abhishek Chandra, Prashant Pradhan, Renu Tewari, S...
IJSN
2008
145views more  IJSN 2008»
13 years 9 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
MICRO
2008
IEEE
162views Hardware» more  MICRO 2008»
13 years 9 months ago
MetaTM/TxLinux: Transactional Memory for an Operating System
This paper quantifies the effect of architectural design decisions on the performance of TxLinux. TxLinux is a Linux kernel modified to use transactions in place of locking primit...
Hany E. Ramadan, Christopher J. Rossbach, Donald E...
MANSCI
2006
119views more  MANSCI 2006»
13 years 9 months ago
Supply Chain Choice on the Internet
Internet companies extensively use the practice of drop-shipping, where the wholesaler stocks and owns the inventory and ships products directly to customers at retailers' re...
Serguei Netessine, Nils Rudi
ADHOC
2005
119views more  ADHOC 2005»
13 years 8 months ago
A link-indexed statistical traffic prediction approach to improving IEEE 802.11 PSM
Power management is an important technique to prolong the lifetime of battery-powered wireless ad hoc networks. The fact that the energy consumed in the idle state dominates the t...
Chunyu Hu, Jennifer C. Hou
« Prev « First page 1525 / 1649 Last » Next »