Sciweavers

7847 search results - page 1383 / 1570
» Designing intimate experiences
Sort
View
PVLDB
2010
166views more  PVLDB 2010»
15 years 2 months ago
Towards Elastic Transactional Cloud Storage with Range Query Support
Cloud storage is an emerging infrastructure that offers Platforms as a Service (PaaS). On such platforms, storage and compute power are adjusted dynamically, and therefore it is i...
Hoang Tam Vo, Chun Chen, Beng Chin Ooi
CASES
2010
ACM
15 years 2 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
IMC
2010
ACM
15 years 2 months ago
Performance comparison of 3G and metro-scale WiFi for vehicular network access
We perform a head-to-head comparison of the performance characteristics of a 3G network operated by a nation-wide provider and a metro-scale WiFi network operated by a commercial ...
Pralhad Deshpande, Xiaoxiao Hou, Samir R. Das
IMC
2010
ACM
15 years 2 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...
MICRO
2010
IEEE
142views Hardware» more  MICRO 2010»
15 years 2 months ago
Virtual Snooping: Filtering Snoops in Virtualized Multi-cores
Virtualization has been rapidly expanding its applications in numerous server and desktop environments to improve the utilization and manageability of physical systems. Such prolif...
Daehoon Kim, Hwanju Kim, Jaehyuk Huh
« Prev « First page 1383 / 1570 Last » Next »