Sciweavers

3712 search results - page 698 / 743
» Role-Based Access Control
Sort
View
ISCC
2006
IEEE
190views Communications» more  ISCC 2006»
14 years 1 months ago
Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods
— In this paper we study multi-hop ad hoc routing in a scalable Underwater Sensor Network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below th...
Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio M...
LCN
2006
IEEE
14 years 1 months ago
Exploiting Rate Diversity for Multicasting in Multi-Radio Wireless Mesh Networks
: A multi-rate capable IEEE 802.11a/b/g node can utilize different link-layer transmission rates. Interestingly, multi-rate capability is defined by IEEE 802.11 standards only for...
Junaid Qadir, Chun Tung Chou, Archan Misra
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
14 years 1 months ago
ASR: Adaptive Selective Replication for CMP Caches
The large working sets of commercial and scientific workloads stress the L2 caches of Chip Multiprocessors (CMPs). Some CMPs use a shared L2 cache to maximize the on-chip cache c...
Bradford M. Beckmann, Michael R. Marty, David A. W...
RTSS
2006
IEEE
14 years 1 months ago
Tightening the Bounds on Feasible Preemption Points
Caches have become invaluable for higher-end architectures to hide, in part, the increasing gap between processor speed and memory access times. While the effect of caches on timi...
Harini Ramaprasad, Frank Mueller
WIOPT
2006
IEEE
14 years 1 months ago
Analytical modeling of ad hoc networks that utilize space-time coding
— This paper presents the first analytical model for ad hoc networks equipped with multiple-input multiple-output (MIMO) radios using space-time coding (STC) that considers the ...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves