Sciweavers

1477 search results - page 174 / 296
» Token flow control
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
13 years 4 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
TVCG
2012
171views Hardware» more  TVCG 2012»
12 years 14 days ago
Region-Based Line Field Design Using Harmonic Functions
—Field design has wide applications in graphics and visualization. One of the main challenges in field design has been how to provide users with both intuitive control over the d...
Chih-Yuan Yao, Ming-Te Chi, Tong-Yee Lee, Tao Ju
OSDI
2002
ACM
14 years 10 months ago
TCP Nice: A Mechanism for Background Transfers
Many distributed applications can make use of large background transfers ? transfers of data that humans are not waiting for ? to improve availability, reliability, latency or con...
Arun Venkataramani, Ravi Kokku, Michael Dahlin
ICC
2007
IEEE
14 years 4 months ago
A Support System for Designing Ubiquitous Service Composition Scenarios
—Ubiquitous service composition provides new services and applications seamlessly by establishing cooperation among any devices in home networks and any services in service provi...
Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, ...
ESTIMEDIA
2007
Springer
14 years 4 months ago
Network Calculus Applied to Verification of Memory Access Performance in SoCs
SoCs for multimedia applications typically use only one port to off-chip DRAM for cost reasons. The sharing of interconnect and the off-chip DRAM port by several IP blocks makes t...
Tomas Henriksson, Pieter van der Wolf, Axel Jantsc...