Sciweavers

3712 search results - page 193 / 743
» Role-Based Access Control
Sort
View
126
Voted
ICML
1997
IEEE
16 years 3 months ago
Predicting Multiprocessor Memory Access Patterns with Learning Models
Machine learning techniques are applicable to computer system optimization. We show that shared memory multiprocessors can successfully utilize machine learning algorithms for mem...
M. F. Sakr, Steven P. Levitan, Donald M. Chiarulli...
105
Voted
ITC
1998
IEEE
71views Hardware» more  ITC 1998»
15 years 6 months ago
A structured and scalable mechanism for test access to embedded reusable cores
The main objective of core-based IC design is improvement of design efficiency and time-to-market. In order to prevent test development from becoming the bottleneck in the entire ...
Erik Jan Marinissen, Robert G. J. Arendsen, Gerard...
141
Voted
CORR
2010
Springer
145views Education» more  CORR 2010»
15 years 2 months ago
Distributed Rate Allocation Policies for Multi-Homed Video Streaming over Heterogeneous Access Networks
We consider the problem of rate allocation among multiple simultaneous video streams sharing multiple heterogeneous access networks. We develop and evaluate an analytical framework...
Xiaoqing Zhu, Piyush Agrawal, Jatinder Pal Singh, ...
106
Voted
SAC
2008
ACM
15 years 2 months ago
Web service access management for integration with agent systems
The agent paradigm includes the notion that agents interact with services. This paper identifies the need for controlled access to such services, from the perspective of agent sys...
Benno J. Overeinder, P. D. Verkaik, Frances M. T. ...
149
Voted
ICCD
2007
IEEE
195views Hardware» more  ICCD 2007»
15 years 6 months ago
LEMap: Controlling leakage in large chip-multiprocessor caches via profile-guided virtual address translation
The emerging trend of larger number of cores or processors on a single chip in the server, desktop, and mobile notebook platforms necessarily demands larger amount of on-chip last...
Jugash Chandarlapati, Mainak Chaudhuri