Sciweavers

5376 search results - page 1023 / 1076
» Scalable Kernel Systems
Sort
View
159
Voted
PPL
2008
185views more  PPL 2008»
15 years 3 months ago
On Design and Application Mapping of a Network-on-Chip(NoC) Architecture
As the number of integrated IP cores in the current System-on-Chips (SoCs) keeps increasing, communication requirements among cores can not be sufficiently satisfied using either ...
Jun Ho Bahn, Seung Eun Lee, Yoon Seok Yang, Jungso...
155
Voted
NETWORK
2006
218views more  NETWORK 2006»
15 years 3 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
128
Voted
SIGMOD
2008
ACM
138views Database» more  SIGMOD 2008»
15 years 3 months ago
Configuration-parametric query optimization for physical design tuning
Automated physical design tuning for database systems has recently become an active area of research and development. Existing tuning tools explore the space of feasible solutions...
Nicolas Bruno, Rimma V. Nehme
142
Voted
TC
2008
15 years 3 months ago
The Synonym Lookaside Buffer: A Solution to the Synonym Problem in Virtual Caches
To support dynamic address translation in today's microprocessors, the first-level cache is accessed in parallel with a translation lookaside buffer (TLB). However, this curre...
Xiaogang Qiu, Michel Dubois
149
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 3 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
« Prev « First page 1023 / 1076 Last » Next »