Sciweavers

1272 search results - page 54 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
CASES
2009
ACM
14 years 3 months ago
Fine-grain performance scaling of soft vector processors
Embedded systems are often implemented on FPGA devices and 25% of the time [2] include a soft processor— a processor built using the FPGA reprogrammable fabric. Because of their...
Peter Yiannacouras, J. Gregory Steffan, Jonathan R...
GLOBECOM
2007
IEEE
14 years 3 months ago
The Design and Evaluation of a Wireless Sensor Network for Mine Safety Monitoring
– This paper describes a wireless sensor network for mine safety monitoring. Based on the characteristics of underground mine gallery and the requirements for mine safety monitor...
Xiaoguang Niu, Xi Huang, Ze Zhao, Yuhe Zhang, Chan...
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 9 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
PDPTA
2000
13 years 10 months ago
Performance Analysis of a Cluster File System
Design of cluster file system is very important for building a general-purpose cluster with commodity components. To provide scalable high I/O performance needed in the scientific...
Cong Du, Zhiwei Xu
DCC
1999
IEEE
14 years 1 months ago
The Effect of Flexible Parsing for Dynamic Dictionary Based Data Compression
We report on the performance evaluation of greedy parsing with a single step lookahead, denoted as flexible parsing. We also introduce a new fingerprint based data structure which...
Yossi Matias, Nasir Rajpoot, Süleyman Cenk Sa...