Sciweavers

5252 search results - page 1007 / 1051
» Logic in Access Control
Sort
View
LCN
2006
IEEE
14 years 4 months ago
Exploiting Rate Diversity for Multicasting in Multi-Radio Wireless Mesh Networks
: A multi-rate capable IEEE 802.11a/b/g node can utilize different link-layer transmission rates. Interestingly, multi-rate capability is defined by IEEE 802.11 standards only for...
Junaid Qadir, Chun Tung Chou, Archan Misra
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
14 years 4 months ago
ASR: Adaptive Selective Replication for CMP Caches
The large working sets of commercial and scientific workloads stress the L2 caches of Chip Multiprocessors (CMPs). Some CMPs use a shared L2 cache to maximize the on-chip cache c...
Bradford M. Beckmann, Michael R. Marty, David A. W...
RTSS
2006
IEEE
14 years 4 months ago
Tightening the Bounds on Feasible Preemption Points
Caches have become invaluable for higher-end architectures to hide, in part, the increasing gap between processor speed and memory access times. While the effect of caches on timi...
Harini Ramaprasad, Frank Mueller
WIOPT
2006
IEEE
14 years 4 months ago
Analytical modeling of ad hoc networks that utilize space-time coding
— This paper presents the first analytical model for ad hoc networks equipped with multiple-input multiple-output (MIMO) radios using space-time coding (STC) that considers the ...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves
ADBIS
2006
Springer
93views Database» more  ADBIS 2006»
14 years 4 months ago
An On-Line Reorganization Framework for SAN File Systems
While the cost per megabyte of magnetic disk storage is economical, organizations are alarmed by the increasing cost of managing storage. Storage Area Network (SAN) architectures ...
Shahram Ghandeharizadeh, Shan Gao, Chris Gahagan, ...
« Prev « First page 1007 / 1051 Last » Next »