Sciweavers

982 search results - page 149 / 197
» Scheduling and Simulation: How to Upgrade Distributed System...
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
13 years 11 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
MSS
1993
IEEE
62views Hardware» more  MSS 1993»
13 years 12 months ago
Striped Tape Arrays
A growing number of applications require high capacity, high throughput tertiary storage systems 1 2 . We are investigating how data striping ideas apply to arrays of magnetic tap...
Ann L. Drapeau, Randy H. Katz
JCM
2008
94views more  JCM 2008»
13 years 7 months ago
Cell Site Power Characterization for Multi-rate Wireless CDMA Data Networks Using Lognormal Approximation
An analytical model is developed to solve the power-rate assignment problem for multi-rate CDMA systems and calculate the probability density function (PDF) for the downlink traffi...
Ashraf S. Hasan Mahmoud
QUESTA
2010
131views more  QUESTA 2010»
13 years 6 months ago
Asymptotically optimal parallel resource assignment with interference
Motivated by scheduling in cellular wireless networks and resource allocation in computer systems, we study a service facility with two classes of users having heterogeneous servi...
Maaike Verloop, R. Núñez Queija
ICMCS
2007
IEEE
123views Multimedia» more  ICMCS 2007»
14 years 2 months ago
BOPPER: Wireless Video Broadcasting with Peer-to-Peer Error Recovery
Wireless digital video broadcasting has experienced much success in recent years with some industrial systems deployed. We study in this paper how to recover lost packets in video...
Shenjie Li, S.-H. Gary Chan