Sciweavers

798 search results - page 127 / 160
» Comparing the expressive power of access control models
Sort
View
MASCOTS
2003
13 years 11 months ago
Zone-Based Shortest Positioning Time First Scheduling for MEMS-Based Storage Devices
Access latency to secondary storage devices is frequently a limiting factor in computer system performance. New storage technologies promise to provide greater storage densities a...
Bo Hong, Scott A. Brandt, Darrell D. E. Long, Etha...
JSAC
2008
157views more  JSAC 2008»
13 years 10 months ago
Spectrum Leasing to Cooperating Secondary Ad Hoc Networks
Abstract--The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resource ...
Osvaldo Simeone, Igor Stanojev, Stefano Savazzi, Y...
OOPSLA
2009
Springer
14 years 4 months ago
Parallel programming with object assemblies
We present Chorus, a high-level parallel programming model suitable for irregular, heap-manipulating applications like mesh refinement and epidemic simulations, and JChorus, an i...
Roberto Lublinerman, Swarat Chaudhuri, Pavol Cern&...
ISPASS
2010
IEEE
14 years 5 months ago
Synthesizing memory-level parallelism aware miniature clones for SPEC CPU2006 and ImplantBench workloads
Abstract—We generate and provide miniature synthetic benchmark clones for modern workloads to solve two pre-silicon design challenges, namely: 1) huge simulation time (weeks to m...
Karthik Ganesan, Jungho Jo, Lizy K. John
MOBISYS
2003
ACM
14 years 9 months ago
Characterizing Mobility and Network Usage in a Corporate Wireless Local-Area Network
Wireless local-area networks are becoming increasingly popular. They are commonplace on university campuses and inside corporations, and they have started to appear in public area...
Magdalena Balazinska, Paul Castro