Sciweavers

191 search results - page 30 / 39
» Providing Effective Access to Shared Resources: A COIN Appro...
Sort
View
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
14 years 1 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
CISS
2010
IEEE
12 years 11 months ago
Self-organizing Dynamic Fractional Frequency Reuse on the uplink of OFDMA systems
Reverse link (or uplink) performance of cellular systems is becoming increasingly important with the emergence of new uplink-bandwidth intensive applications such as Video Share [...
Balaji Rengarajan, Alexander L. Stolyar, Harish Vi...
BMCBI
2008
149views more  BMCBI 2008»
13 years 8 months ago
All-paths graph kernel for protein-protein interaction extraction with evaluation of cross-corpus learning
Background: Automated extraction of protein-protein interactions (PPI) is an important and widely studied task in biomedical text mining. We propose a graph kernel based approach ...
Antti Airola, Sampo Pyysalo, Jari Björne, Tap...
MICRO
2003
IEEE
161views Hardware» more  MICRO 2003»
14 years 1 months ago
Design and Implementation of High-Performance Memory Systems for Future Packet Buffers
In this paper we address the design of a future high-speed router that supports line rates as high as OC-3072 (160 Gb/s), around one hundred ports and several service classes. Bui...
Jorge García-Vidal, Jesús Corbal, Ll...
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 8 months ago
Performance Investigation of Virtual Private Networks with Different Bandwidth Allocations
A Virtual Private Network (VPN) provides private network connections over a publicly accessible shared network. The effective allocation of bandwidth for VPNs assumes significance...
Mahalakshmi Chidambara Natarajan, Ramaswamy Muthia...