Sciweavers

3375 search results - page 254 / 675
» Resource Sharing in Performance Models
Sort
View
CCS
2004
ACM
14 years 3 months ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
INFOCOM
2003
IEEE
14 years 3 months ago
Nash equilibria of a generic networking game with applications to circuit-switched networks
— A generic mechanism for end-user transmission rate control into a differentiated services Internet is formulated and basic results of corresponding Nash equilibria are proved. ...
Youngmi Jin, George Kesidis
APWEB
2008
Springer
13 years 11 months ago
SemSearch: A Scalable Semantic Searching Algorithm for Unstructured P2P Network
Resource searching in the current peer-to-peer (P2P) applications is mainly based on the keyword match. However, more and more P2P applications require an efficient semantic search...
Wei Song, Ruixuan Li, Zhengding Lu, Mudar Sarem
ERSA
2006
113views Hardware» more  ERSA 2006»
13 years 11 months ago
Efficient FPGA-based Implementations of the MIMO-OFDM Physical Layer
- In this paper, we present a prototype FPGA design for an efficient physical layer implementation of a MIMO-OFDM technique. We propose a pipelined architecture using a Fast Fourie...
Jeoong Sung Park, Hong-Jip Jung, Viktor K. Prasann...
MICRO
2006
IEEE
96views Hardware» more  MICRO 2006»
13 years 9 months ago
Molecular Caches: A caching structure for dynamic creation of application-specific Heterogeneous cache regions
CMPs enable simultaneous execution of multiple applications on the same platforms that share cache resources. Diversity in the cache access patterns of these simultaneously execut...
Keshavan Varadarajan, S. K. Nandy, Vishal Sharda, ...