Sciweavers

762 search results - page 62 / 153
» Finding SHA-1 Characteristics: General Results and Applicati...
Sort
View
ICC
2007
IEEE
14 years 5 months ago
Handoff Probability in Wireless Networks Over Rayleigh Fading Channel: A Cross-layer Approach
Abstract— Handoff probability is one of the significant metrics to characterize the handoff operation in wireless mobile networks. Handoff probability refers to the probability ...
Yan Zhang
WWW
2004
ACM
14 years 11 months ago
C3W: clipping, connecting and cloning for the web
Many of today's Web applications support just simple trial-anderror retrievals: supply one set of parameters, obtain one set of results. For a user who wants to examine a num...
Aran Lunzer, Jun Fujima, Kasper Hornbæk, Yuz...
GLVLSI
2009
IEEE
186views VLSI» more  GLVLSI 2009»
14 years 5 months ago
Bitmask-based control word compression for NISC architectures
Implementing a custom hardware is not always feasible due to cost and time considerations. No instruction set computer (NISC) architecture is one of the promising direction to des...
Chetan Murthy, Prabhat Mishra
ASPLOS
2009
ACM
14 years 11 months ago
Understanding software approaches for GPGPU reliability
Even though graphics processors (GPUs) are becoming increasingly popular for general purpose computing, current (and likely near future) generations of GPUs do not provide hardwar...
Martin Dimitrov, Mike Mantor, Huiyang Zhou
DEBS
2007
ACM
14 years 2 months ago
On adding replies to publish-subscribe
Recently, the publish-subscribe communication model has attracted the attention of developers as a viable alternative to traditional communication schemas, like request/reply, for...
Gianpaolo Cugola, Matteo Migliavacca, Alessandro M...