نتایج جستجو برای: access and evaluation

تعداد نتایج: 17019593  

Journal: :International Journal of Computer Applications 2020

2007
Gilles Berger-Sabbatel Yan Grunenberger Martin Heusse Franck Rousseau Andrzej Duda

Traditional measurement tools are not suitable for finegrain performance evaluation of 802.11 wireless networks. To improve this situation, we have developed Interarrival Histograms, a method for measuring transmission delays based on gathering statistics of interarrival intervals at a receiving station. By measuring a sufficient number of interarrival interval samples with a clock resolution o...

1991
Sujata Banerjee Victor O. K. Li

The analysis of the data accessing mechanism is of importance to the analytical performance evaluation of any data processing system. So far, most such analyses have been done under the assumption of an uniform data access model. This is not true in the real world and some attempts at modeling non-uniform data access have been made. In this paper, we develop a new, improved model, which we beli...

1998
Qinglong Hu Dik Lun Lee Wang-Chien Lee

Information broadcasting, caching of frequently accessed data, and pull-based data delivery are commonly used techniques to reduce data access time of wireless information services. Most of the studies in the literature focused either on individual technique or a combination of them with some restrictive assumptions. In this paper, we propose a dynamic data delivery model where these three tech...

Journal: :IJCC 2012
Hassan Takabi James B. D. Joshi

Cloud computing environments do not allow use of a single access control mechanism, single policy language or single policy management tool for various cloud services. Currently, users must use diverse access control solutions available for each cloud service provider to secure their data. Access control policies may be composed in incompatible ways because of diverse policy languages that are ...

2010
Kenji Yamamoto Toshihiro Yamauchi

Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different implementation methods have been adopted. However, there is no method for easily evaluating the p...

Journal: :CoRR 2011
Ahmed Riadh Rebai Saïd Hanafi

Previous studies have shown that the actual handoff schemes employed in the IEEE 802.11 Wireless LANs (WLANs) do not meet the strict delay constraints placed by many multimedia applications like Voice over IP. Both the active and the passive supported scan modes in the standard handoff procedure have important delay that affects the Quality of Service (QoS) required by the real-time communicati...

2003
Sushmitha P. Kini Jiuxing Liu Jiesheng Wu Pete Wyckoff Dhabaleswar K. Panda

This paper describes a methodology for efficiently implementing the collective operations, in this case the barrier, on clusters with the emerging InfiniBand Architecture (IBA). IBA provides hardware level support for the Remote Direct Memory Access (RDMA) message passing model as well as the multicast operation. Exploiting these features of InfiniBand to efficiently implement the barrier opera...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید