Sciweavers

8243 search results - page 1579 / 1649
» Can We Manage Trust
Sort
View
MICRO
2010
IEEE
142views Hardware» more  MICRO 2010»
13 years 6 months ago
Virtual Snooping: Filtering Snoops in Virtualized Multi-cores
Virtualization has been rapidly expanding its applications in numerous server and desktop environments to improve the utilization and manageability of physical systems. Such prolif...
Daehoon Kim, Hwanju Kim, Jaehyuk Huh
MM
2010
ACM
191views Multimedia» more  MM 2010»
13 years 6 months ago
Quantifying tag representativeness of visual content of social images
Social tags describe images from many aspects including the visual content observable from the images, the context and usage of images, user opinions and others. Not all tags are ...
Aixin Sun, Sourav S. Bhowmick
FAST
2009
13 years 6 months ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger
IDC
2009
Springer
13 years 6 months ago
Efficient Broadcasting by Selective Forwarding
A major challenge faced in mobile ad hoc networks (MANETs) is locating devices for communication, especially in the case of high node mobility and sparse node density. Present solu...
Doina Bein, Ajoy Kumar Datta, Balaji Ashok Sathyan...
DEBU
2010
159views more  DEBU 2010»
13 years 6 months ago
Accelerating In-Page Logging with Non-Volatile Memory
A great deal of research has been done on solid-state storage media such as flash memory and non-volatile memory in the past few years. While NAND-type flash memory is now being c...
Sang-Won Lee, Bongki Moon, Chanik Park, Joo Young ...
« Prev « First page 1579 / 1649 Last » Next »