Sciweavers

48 search results - page 7 / 10
» Controlling resource access in Directed Bigraphs
Sort
View
ICC
2008
IEEE
152views Communications» more  ICC 2008»
14 years 4 months ago
MAC Performance of a 3GPP-LTE Multihop Cellular Network
— Multihop cellular networks offer increased coverage and capacity compared to singlehop cells of the same size. This is not as huge as using more base stations (BS) instead of w...
Rainer Schoenen, Rüdiger Halfmann, Bernhard W...
ACSAC
2001
IEEE
14 years 1 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
KIVS
2001
Springer
14 years 2 months ago
Real-Time Support on Top of Ethernet
Ethernet is a widely used low-cost networking technology. It however lacks the determinism and resource management features needed to meet realtime requirements of multimedia appli...
Rainer Koster, Thorsten Kramp
JCS
2008
69views more  JCS 2008»
13 years 9 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
DSN
2009
IEEE
14 years 1 months ago
Processor reliability enhancement through compiler-directed register file peak temperature reduction
Each semiconductor technology generation brings us closer to the imminent processor architecture heat wall, with all its associated adverse effects on system performance and reliab...
Chengmo Yang, Alex Orailoglu