Sciweavers

916 search results - page 51 / 184
» Performance Evaluation of Scheduling Policies for Volunteer ...
Sort
View
SDMW
2007
Springer
14 years 2 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
ICC
2007
IEEE
126views Communications» more  ICC 2007»
14 years 2 months ago
Evaluation of Grouping Strategies for an Hierarchical SDMA/TDMA Scheduling Process
Abstract— Adding SDMA capabilities to modern wireless communication systems like IEEE 802.16 WiMAX promises high system capacity gains but raises the problem of combining orthogo...
Christian Hoymann, Jan Ellenbeck, Ralf Pabst, Marc...
DEBS
2010
ACM
13 years 12 months ago
Reliable complex event detection for pervasive computing
Complex event processing for pervasive computing must deal with various sources of error. In this paper, we focus on improving complex event detector handling of several types of ...
Dan O'Keeffe, Jean Bacon
ISCA
2011
IEEE
240views Hardware» more  ISCA 2011»
12 years 11 months ago
Virtualizing performance asymmetric multi-core systems
Performance-asymmetric multi-cores consist of heterogeneous cores, which support the same ISA, but have different computing capabilities. To maximize the throughput of asymmetric...
Youngjin Kwon, Changdae Kim, Seungryoul Maeng, Jae...
ETS
2000
IEEE
144views Hardware» more  ETS 2000»
13 years 7 months ago
An Evaluation of Computer Mediated Communication to Support Group Discussion in Continuing Education
An evaluation of a taught module within a Post-Graduate Master of Education course is reported. Participants on the course were mainly teachers learning for continuing professiona...
Rachel M. Pilkington, Catherine L. Bennett, Sarah ...