Sciweavers

3712 search results - page 600 / 743
» Role-Based Access Control
Sort
View
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
14 years 2 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
IPPS
1997
IEEE
14 years 2 months ago
MTIO - A Multi-Threaded Parallel I/O System
This paper presents the design and evaluation of a multithreaded runtime library for parallel I/O. We extend the multi-threading concept to separate the compute and I/O tasks in t...
Sachin More, Alok N. Choudhary, Ian T. Foster, Min...
SIGCOMM
1997
ACM
14 years 2 months ago
Solutions to Hidden Terminal Problems in Wireless Networks
The floor acquisition multiple access (FAMA) discipline is analyzed in networks with hidden terminals. According to FAMA, control of the channel (the floor) is assigned to at mo...
Chane L. Fullmer, J. J. Garcia-Luna-Aceves
ADBIS
1997
Springer
131views Database» more  ADBIS 1997»
14 years 2 months ago
Centralized versus Distributed Index Schemes in OODBMS - A Performance Analysis
Recent work on client-server data-shipping OODBs has demonstratedthe usefulnessof localdatacachingat clientsites. In addition to data caching, index caching can provide substantia...
Julie Basu, Arthur M. Keller, Meikel Pöss
HPCA
1996
IEEE
14 years 2 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...