Sciweavers

129 search results - page 22 / 26
» The Medium And The Message
Sort
View
VLDB
2001
ACM
104views Database» more  VLDB 2001»
13 years 12 months ago
Cache Fusion: Extending Shared-Disk Clusters with Shared Caches
Cache Fusion TM is a fundamental component of Oracle’s Real Application Cluster configuration, a shared-cache clustered-database architecture that transparently extends databas...
Tirthankar Lahiri, Vinay Srihari, Wilson Chan, N. ...
ISCC
2000
IEEE
13 years 12 months ago
On Multiple Traffic Type Integration over Wireless TDMA Channels
A new medium access control (MAC) protocol for mobile wireless communications is presented and investigated. We explore, via an extensive simulation study, the performance of the ...
Polychronis Koutsakis, Michael Paterakis
IPPS
1997
IEEE
13 years 11 months ago
Empirical Evaluation of Distributed Mutual Exclusion Algorithms
In this paper, we evaluated various distributed mutual exclusion algorithms on the IBM SP2 machine and the Intel iPSC/860 system. The empirical results are compared in terms of su...
Shiwa S. Fu, Nian-Feng Tzeng, Zhiyuan Li
BCSHCI
2008
13 years 9 months ago
EZ phone: persuading mobile users to conserve energy
Mobile persuasion is using a mobile device to motivate people to change their behavior in a positive way. Thus there is the potential in investigating how mobile technology could ...
Abdullah Al Mahmud, Omar Mubin, Suleman Shahid, Ja...
ICISC
2007
102views Cryptology» more  ICISC 2007»
13 years 9 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran