Sciweavers

2687 search results - page 440 / 538
» On the Conversion between Number Systems
Sort
View
SISW
2003
IEEE
14 years 2 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
DATE
2002
IEEE
130views Hardware» more  DATE 2002»
14 years 1 months ago
Assigning Program and Data Objects to Scratchpad for Energy Reduction
The number of embedded systems is increasing and a remarkable percentage is designed as mobile applications. For the latter, the energy consumption is a limiting factor because of...
Stefan Steinke, Lars Wehmeyer, Bo-Sik Lee, Peter M...
SIGCOMM
2000
ACM
14 years 1 months ago
SmartBridge: A scalable bridge architecture
As the number of hosts attached to a network increases beyond what can be connected by a single local area network (LAN), forwarding packets between hosts on different LANs become...
Thomas L. Rodeheffer, Chandramohan A. Thekkath, Da...
IPPS
1999
IEEE
14 years 1 months ago
A Consistent History Link Connectivity Protocol
The RAIN (Reliable Array of Independent Nodes) project at Caltech is focusing on creating highly reliable distributed systems by leveraging commercially available personal compute...
Paul S. LeMahieu, Jehoshua Bruck
ISCA
1999
IEEE
98views Hardware» more  ISCA 1999»
14 years 1 months ago
Multicast Snooping: A New Coherence Method Using a Multicast Address Network
This paper proposes a new coherence method called "multicast snooping" that dynamically adapts between broadcast snooping and a directory protocol. Multicast snooping is...
E. Ender Bilir, Ross M. Dickson, Ying Hu, Manoj Pl...