نتایج جستجو برای: access pattern
تعداد نتایج: 666151 فیلتر نتایج به سال:
This paper investigates uplink pattern optimisation algorithms with and without power control for a smart antenna system operating in an infrastructure Wireless Local Area Network (WLAN) following IEEE802.11a or HIPERLAN/2 standards. An indoor infrastructure WLAN scenario with multiple users communicating with an access point is modelled using a deterministic ray-tracing tool. The WLAN access p...
Cloud computing is a new computing paradigm that is gaining increased popularity. More and more sensitive user data are stored in the cloud. The privacy of users’ access pattern to the data should be protected to prevent un-trusted cloud servers from inferring users’ private information or launching stealthy attacks. Meanwhile, the privacy protection schemes should be efficient as cloud users o...
Most caching and prefetching research does not take advantage of prior knowledge of access patterns, or does not adequately address the storage issues inherent with multidimensional scientific data. Armed with an access pattern specified as an iteration over a multidimensional array stored in a disk file, we use prefetching to greatly reduce the number of disk accesses and partially hide the co...
With the emergence of cloud computing, more and more sensitive user data are outsourced to remote storage servers. The privacy of users’ access pattern to the data should be protected to prevent un-trusted storage servers from inferring users’ private information or launching stealthy attacks. Meanwhile, the privacy protection schemes should be efficient as cloud users often use thin client dev...
In object-oriented or object-relational databases such as multimedia databases or most XML databases, access patterns are not static, i.e., applications do not always access the same objects in the same order repeatedly. However, this has been the way these databases and associated optimisation techniques such as clustering have been evaluated up to now. This paper opens up research regarding t...
The WWW and its associated distributed information services provide rich world-wide online information services, where objects are linked together to facilitate interactive access. Users seeking information of Internet traverse from one object via links to another. It is important to analyze user access patterns which will help improve web pages design by providing an efficient access between h...
introduction: an overlooked but important part of successful root canal treatment is a straight-line access (sla). the purpose of this in vitro study was to compare the efficacy of introfile and prerace rotary instruments with gates glidden (gg) drills in gaining sla by cone-beam computed tomography (cbct). methods and materials: a total of forty five extracted mandibular first molars were sele...
the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis,a one-way anova experimental design was carried out. 24 sednior students of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inter...
the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis , a one- way anova experimental design was carried out. 24 senior student of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inte...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید