Sciweavers

2187 search results - page 380 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
FODO
1993
Springer
110views Algorithms» more  FODO 1993»
14 years 3 hour ago
Storage System Architectures for Continuous Media Data
Abstract. Data storage systems are being called on to manage continuous media data types, such as digital audio and video. There is a demand by applications for \constrained-latenc...
David Maier, Jonathan Walpole, Richard Staehli
CORR
2010
Springer
170views Education» more  CORR 2010»
13 years 8 months ago
Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Adaptive orthogonal frequency division multiple access (OFDMA) has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wire...
William Weiliang Li, Ying Jun Zhang, Anthony Man-C...
JSA
2008
136views more  JSA 2008»
13 years 7 months ago
Evaluation and optimization of a peer-to-peer video-on-demand system
Video-on-demand (VoD) is increasingly popular with internet users. However, VoD is costly due to the load placed on video servers. Peer-to-peer (P2P) techniques are an approach to...
Bin Cheng, Xiuzheng Liu, Zheng Zhang, Hai Jin, Lex...
SAC
2005
ACM
14 years 1 months ago
Performance analysis framework for large software-intensive systems with a message passing paradigm
The launch of new features for mobile phones is increasing and the product life cycle symmetrically decreasing in duration as higher levels of sophistication are reached. Therefor...
Christian Del Rosso
HICSS
1999
IEEE
267views Biometrics» more  HICSS 1999»
14 years 6 days ago
Annotate: A Web-based Knowledge Management Support System for Document Collections
Knowledge management is an increasingly important source of competitive advantage for organizations. Knowledge is a renewable, re-usable and accumulating asset of value to firms t...
Mark Ginsburg, Ajit Kambil