Sciweavers

270 search results - page 16 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
ISCA
1999
IEEE
187views Hardware» more  ISCA 1999»
13 years 11 months ago
Area Efficient Architectures for Information Integrity in Cache Memories
Information integrity in cache memories is a fundamental requirement for dependable computing. Conventional architectures for enhancing cache reliability using check codes make it...
Seongwoo Kim, Arun K. Somani
UIC
2007
Springer
14 years 1 months ago
Maximizing Network Lifetime Under Reliability Constraints Using a Cross-Layer Design in Dense Wireless Sensor Networks
Abstract. Recent experimental studies have shown that radio links between low-power devices are extremely unreliable. In particular, the instability and unpredictability of low-pow...
Shan Guo Quan, Young Yong Kim
RTSS
1996
IEEE
13 years 11 months ago
Scheduling transactions with temporal constraints: exploiting data semantics
In this paper, issues involved in the design of a real-time database which maintains data temporal consistency are discussed. The concept of data-deadline is introduced and time co...
Ming Xiong, Rajendran M. Sivasankaran, John A. Sta...
GIS
2004
ACM
14 years 8 months ago
Energy efficient exact kNN search in wireless broadcast environments
The advances in wireless communication and decreasing costs of mobile devices have enabled users to access desired information at any time. Coupled with positioning technologies l...
Bugra Gedik, Aameek Singh, Ling Liu
NETWORKING
2008
13 years 9 months ago
Traffic Engineering and Routing in IP Networks with Centralized Control
There have been research initiatives in centralized control recently, which advocate that the control of an autonomous system (AS) should be performed in a centralized fashion. In ...
Jing Fu, Peter Sjödin, Gunnar Karlsson