Sciweavers

1000 search results - page 165 / 200
» SR-IOV Networking in Xen: Architecture, Design and Implement...
Sort
View
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
ISLPED
2006
ACM
100views Hardware» more  ISLPED 2006»
14 years 2 months ago
Selective writeback: exploiting transient values for energy-efficiency and performance
Today’s superscalar microprocessors use large, heavily-ported physical register files (RFs) to increase the instruction throughput. The high complexity and power dissipation of ...
Deniz Balkan, Joseph J. Sharkey, Dmitry Ponomarev,...
CBSE
2005
Springer
14 years 1 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton
MIDDLEWARE
2005
Springer
14 years 1 months ago
Context aware sensornet
Advances in MEMS technology, wireless communications, and digital electronics have enabled the development of low-cost, low-power, multifunctional sensor nodes that integrating th...
Huaifeng Qin, Xingshe Zhou
COMPSAC
2002
IEEE
14 years 1 months ago
Personalized Redirection of Communication
Universal access to information and data is an important goal of current research. Previously different forms of information and data, captured by different devices or held on dif...
Yuping Yang, M. Howard Williams