Sciweavers

135 search results - page 11 / 27
» Resource Sharing in Custom Instruction Set Extensions
Sort
View
DAC
2005
ACM
14 years 9 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
CIDR
2011
274views Algorithms» more  CIDR 2011»
13 years 4 days ago
Cloud Resource Orchestration: A Data-Centric Approach
Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infras...
Yun Mao, Changbin Liu, Jacobus E. van der Merwe, M...
QUESTA
2006
100views more  QUESTA 2006»
13 years 8 months ago
A queueing analysis of max-min fairness, proportional fairness and balanced fairness
We compare the performance of three usual allocations (max-min fairness, proportional fairness and balanced fairness) in a communication network whose resources are shared by a ra...
Thomas Bonald, Laurent Massoulié, Alexandre...
CLEF
2003
Springer
14 years 1 months ago
Creating the DISEQuA Corpus: A Test Set for Multilingual Question Answering
This paper describes the procedure adopted by the three co-ordinators of the CLEF 2003 question answering track (ITC-irst, UNED and ILLC) to create the question set for the monoli...
Bernardo Magnini, Simone Romagnoli, Alessandro Val...
DANCE
2002
IEEE
14 years 1 months ago
Active Names: Flexible Location and Transport of Wide-Area Resources
In this paper, we explore flexible name resolution as a way of supporting extensibility for wide-area distributed services. Our approach, called Active Names, maps names to a cha...
Amin Vahdat, Michael Dahlin, Thomas E. Anderson, A...