Sciweavers

6656 search results - page 1314 / 1332
» Change, Change, Change: Three Approaches
Sort
View
MICRO
2002
IEEE
117views Hardware» more  MICRO 2002»
13 years 7 months ago
Generating physical addresses directly for saving instruction TLB energy
Power consumption and power density for the Translation Lookaside Buffer (TLB) are important considerations not only in its design, but can have a consequence on cache design as w...
Ismail Kadayif, Anand Sivasubramaniam, Mahmut T. K...
MONET
2002
162views more  MONET 2002»
13 years 7 months ago
AMRoute: Ad Hoc Multicast Routing Protocol
The Ad hoc Multicast Routing protocol (AMRoute) presents a novel approach for robust IP Multicast in mobile ad hoc networks by exploiting user-multicast trees and dynamic logical c...
Jason Xie, Rajesh R. Talpade, Anthony McAuley, Min...
PE
2002
Springer
158views Optimization» more  PE 2002»
13 years 7 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
TMI
1998
137views more  TMI 1998»
13 years 7 months ago
Dynamic Imaging and Tracer Kinetic Modeling for Emission Tomography Using Rotating Detectors
— When performing dynamic studies using emission tomography the tracer distribution changes during acquisition of a single set of projections. This is particularly true for some ...
Chi-Hoi Lau, David Dagan Feng, Brian F. Hutton, Da...
TON
1998
103views more  TON 1998»
13 years 7 months ago
Using name-based mappings to increase hit rates
—Clusters of identical intermediate servers are often created to improve availability and robustness in many domains. The use of proxy servers for the World Wide Web (WWW) and of...
David Thaler, Chinya V. Ravishankar
« Prev « First page 1314 / 1332 Last » Next »