نتایج جستجو برای: data access time

تعداد نتایج: 3990836  

Journal: Money and Economy 2009
Abolfazl Khavarinejad,

This paper provides a brief technical survey of the historical national accounts of Iran. Gaining access to longer-term time series in compliance with concepts, classifications and standards comparable to the present one help fulfill quantitative studies in the area of business cycles. Despite the shortage of reliable, standardized and classified information, the methodology applied in thi...

Journal: :Theor. Comput. Sci. 2013
Amr Elmasry Daniel Dahl Juhl Jyrki Katajainen S. Srinivasa Rao

Given an unordered array of N elements drawn from a totally ordered set and an integer k in the range from 1 to N , in the classic selection problem the task is to find the k-th smallest element in the array. We study the complexity of this problem in the space-restricted random-access model: The input array is stored on read-only memory, and the algorithm has access to a limited amount of work...

2007
Hangbae Chang Moonoh Kim Hyuk-jun Kwon Byungwan Han

With continuing security concerns for airport operations, the protection of internal operational protocols of an international airport has become more critical than ever before. Therefore, the Information Security System (ISS) was developed for Incheon International Airport which can protect the critical information related to airport operations. The developed ISS includes a document access con...

1999
Y. Ji T. H. Hubing

This paper presents techniques for optimizing the performance of FEM/MoM codes. The process of computing MoM matrices can be accelerated by choosing the order of Gaussian Quadrature calculations adaptively and taking advantage of the symmetric nature of the impedance (or admittance) matrix. Optimizing loop index order and buffering loop indices can significantly improve the performance of matri...

Journal: :Computer Networks 2015
Eduard Garcia Villegas Muhammad Shahwaiz Afaqui Elena López-Aguilera

The proliferation of IEEE 802.11 networks has made them an easy and attractive target for malicious devices/adversaries which intend to misuse the available network. In this paper, we introduce a novel malicious entity detection method for IEEE 802.11 networks. We propose a new metric, the Beacon Access Time (BAT), which is employed in the detection process and inherits its characteristics from...

2007
Rodrigo Fernandes de Mello Jose Augusto Andrade Filho Evgueni Dodonov Renato Porfirio Ishii Laurence T. Yang

This work evaluates two artificial intelligence techniques for file distribution in Grid environments. These techniques are used to access data on independent servers in parallel, in order to improve the performance and maximize the throughput rate. In this work, genetic algorithms and Hopfield neural networks are the techniques used to solve the problem. Both techniques are evaluated for effic...

Journal: :Data Knowl. Eng. 2007
Song-Yi Yi Sungwon Jung Jonghyun Suh

Data broadcasting is an efficient data dissemination method in a wireless client–server system. A data server broadcasts data items periodically, and mobile clients cache data items to save communication bandwidth, resource usage, and data access time. The server also broadcasts invalidation reports (IRs) to maintain the consistency between server data and the clients’ cached data. Most existin...

Journal: :IEEE Trans. Knowl. Data Eng. 2003
Ming-Syan Chen Kun-Lung Wu Philip S. Yu

Energy saving is one of the most important issues in wireless mobile computing. Among others, one viable approach to achieving energy saving is to use an indexed data organization to broadcast data over wireless channels to mobile units. Using indexed broadcasting, mobile units can be guided to the data of interest efficiently and only need to be actively listening to the broadcasting channel w...

2003
Zhanping Yin Victor C. M. Leung

This paper presents a novel architecture for Wireless Application Protocol (WAP) 2.0 employing a proxy to isolate the wireless domain from the wired domain, and an advanced data compression scheme to significantly reduce the wireless access time (WAT) while overcoming the WAP 1.x end-to-end security problem. The compression scheme combines content compression with robust header compression (ROH...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید