Sciweavers

1780 search results - page 252 / 356
» Polymorphic Contention Management
Sort
View
ICPADS
2008
IEEE
15 years 9 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi
ISCA
2008
IEEE
165views Hardware» more  ISCA 2008»
15 years 8 months ago
Using Hardware Memory Protection to Build a High-Performance, Strongly-Atomic Hybrid Transactional Memory
We demonstrate how fine-grained memory protection can be used in support of transactional memory systems: first showing how a software transactional memory system (STM) can be m...
Lee Baugh, Naveen Neelakantam, Craig B. Zilles
ITNG
2008
IEEE
15 years 8 months ago
On the Properties of System-Wide Responsive Behavior
High contention of flows is associated with unstable network behavior and unmanageable resource administration, i.e., convergence to equilibrium becomes a difficult task. In this ...
Ageliki Tsioliaridou, Vassilis Tsaoussidis
PIMRC
2008
IEEE
15 years 8 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
SEMCO
2008
IEEE
15 years 8 months ago
Towards LarKC: A Platform for Web-Scale Reasoning
Current Semantic Web reasoning systems do not scale to the requirements of their hottest applications, such as analyzing data from millions of mobile devices, dealing with terabyt...
Dieter Fensel, Frank van Harmelen, Bo Andersson, P...