Sciweavers

1272 search results - page 48 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
SIGCOMM
2000
ACM
14 years 1 months ago
Endpoint admission control: Architectural issues and performance
The traditional approach to implementing admission control, as exemplified by the Integrated Services proposal in the IETF, uses a signalling protocol to establish reservations a...
Lee Breslau, Edward W. Knightly, Scott Shenker, Io...
ISCA
2007
IEEE
94views Hardware» more  ISCA 2007»
13 years 9 months ago
Tailoring quantum architectures to implementation style: a quantum computer for mobile and persistent qubits
In recent years, quantum computing (QC) research has moved from the realm of theoretical physics and mathematics into real implementations [9]. With many different potential hardw...
Eric Chi, Stephen A. Lyon, Margaret Martonosi
ICADL
2004
Springer
137views Education» more  ICADL 2004»
14 years 2 months ago
Using Content-Based and Link-Based Analysis in Building Vertical Search Engines
This paper reports our research in the Web page filtering process in specialized search engine development. We propose a machine-learning-based approach that combines Web content a...
Michael Chau, Hsinchun Chen
APSEC
2003
IEEE
14 years 2 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
PCRCW
1997
Springer
14 years 1 months ago
ChaosLAN: Design and Implementation of a Gigabit LAN Using Chaotic Routing
In recent years, theChaos Project at theUniversityofWashingtonhas analyzed and simulated a dozen routing algorithms. Three new routing algorithms have been invented; of these, the...
Neil R. McKenzie, Kevin Bolding, Carl Ebeling, Law...