Sciweavers

6229 search results - page 90 / 1246
» Models of Computation for Networks on Chip
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
13 years 3 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
CPHYSICS
2007
81views more  CPHYSICS 2007»
13 years 9 months ago
The ATLAS computing model: status, plans and future possibilities
The ATLAS Collaboration[1] has been preparing for Large Hadron Collider (LHC) running for more than 20 years. By summer of 2007 we expect the first colliding beams of protons and...
Shawn McKee
BROADNETS
2007
IEEE
14 years 3 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy
IPPS
2003
IEEE
14 years 2 months ago
Trust Modeling for Peer-to-Peer Based Computing Systems
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. ...
Farag Azzedin, Muthucumaru Maheswaran
AINA
2007
IEEE
14 years 3 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang