Sciweavers

427 search results - page 26 / 86
» Policies: Giving Users Control over Calls
Sort
View
MICRO
2008
IEEE
149views Hardware» more  MICRO 2008»
14 years 4 months ago
Prefetch-Aware DRAM Controllers
Existing DRAM controllers employ rigid, non-adaptive scheduling and buffer management policies when servicing prefetch requests. Some controllers treat prefetch requests the same ...
Chang Joo Lee, Onur Mutlu, Veynu Narasiman, Yale N...
ESORICS
2011
Springer
12 years 9 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
GLOBECOM
2007
IEEE
14 years 4 months ago
A New Stochastic Admission Control Scheme for Wireless Networks
— In traditional call admission control (CAC) schemes, mobile users are always the passive roles during the admission procedures and the base station determines whether to admit o...
Xinbing Wang, Chen Zhuo, Youyun Xu, Ruhai Wang
MST
2011
200views Hardware» more  MST 2011»
13 years 4 months ago
Performance of Scheduling Policies in Adversarial Networks with Non-synchronized Clocks
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model [5] by considering the possibility that the router clocks in the network are not synchronized. W...
Antonio Fernández Anta, José Luis L&...
SRDS
2000
IEEE
14 years 2 months ago
Optimistic Virtual Synchrony
Group communication systems are powerful building blocks that facilitate the development of fault-tolerant distributed applications. Such systems generally run in an asynchronous ...
Jeremy B. Sussman, Idit Keidar, Keith Marzullo