Sciweavers

3303 search results - page 114 / 661
» Multidimensional Access Methods
Sort
View
ASAP
2006
IEEE
89views Hardware» more  ASAP 2006»
14 years 23 days ago
Polyhedral Modeling and Analysis of Memory Access Profiles
In this paper, we propose to model memory access profile information as loop nests exhibiting useful characteristics on the memory behavior, such as periodicity, linearly linked m...
Philippe Clauss, Bénédicte Kenmei
SEDE
2007
13 years 10 months ago
BeLearning: Designing accessible web applications
Flexibility and adaptivity are two of the outstanding characteristics of new media and new technologies. These properties allow new methods to provide physically challenged people...
Helmut Vieritz, Sabina Jeschke
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 9 months ago
Ciphertext Policy Attribute based Encryption with anonymous access policy
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attribut...
A. Balu, K. Kuppusamy
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 9 months ago
Access-Network Association Policies for Media Streaming in Heterogeneous Environments
Abstract--We study the design of media streaming applications in the presence of multiple heterogeneous wireless access methods with different throughputs and costs. Our objective ...
Ali ParandehGheibi, Muriel Médard, Asuman E...
LCN
2007
IEEE
14 years 3 months ago
Investigation of IEEE 802.11k-based Access Point Coverage Area and Neighbor Discovery
— Possessing knowledge about access point coverage areas and neighbors is of essential need for the provisioning of, e.g., location based handovers or push services. A convenient...
Sven D. Hermann, Marc Emmelmann, O. Belaifa, Adam ...