Sciweavers

6224 search results - page 1008 / 1245
» Recent Advances in Networking
Sort
View
ISCA
2007
IEEE
143views Hardware» more  ISCA 2007»
15 years 11 months ago
Interconnect design considerations for large NUCA caches
The ever increasing sizes of on-chip caches and the growing domination of wire delay necessitate significant changes to cache hierarchy design methodologies. Many recent proposal...
Naveen Muralimanohar, Rajeev Balasubramonian
VTC
2007
IEEE
192views Communications» more  VTC 2007»
15 years 11 months ago
Access Scheduling Based on Time Water-Filling for Next Generation Wireless LANs
Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...
Ertugrul Necdet Ciftcioglu, Özgür Gü...
ICDIM
2007
IEEE
15 years 11 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel
ICMCS
2007
IEEE
145views Multimedia» more  ICMCS 2007»
15 years 11 months ago
MUSEMBLE: A Music Retrieval System Based on Learning Environment
Query reformulation has been suggested as an effective way to improve retrieval efficiency in text information retrieval and one of the well-known techniques for query reformulati...
Seungmin Rho, Byeong-jun Han, Eenjun Hwang, Minkoo...
CCS
2007
ACM
15 years 11 months ago
Detecting covert timing channels: an entropy-based approach
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the ...
Steven Gianvecchio, Haining Wang
« Prev « First page 1008 / 1245 Last » Next »