Project Athena Executive Committee‚ "An Introduction to Project Athena"‚ MIT‚ 1983. [4] J.M. Bacon and K.G. Hamilton‚ "Distributed Computing with the RPC: the Cambridge Approach"‚ Distributed Processing‚ IFIP‚ North-Holland‚ 1988‚ pp Applications"‚ In Proc. of the 1987 Summer USENIX Conference (Phoenix‚ Ariz.‚ June)‚ USENIX Association‚ Berkeley‚ Calif.‚ 1987‚ pp Mishkin‚ Joseph N. Pato‚ and Geoffrey L. Wyant‚ Network Computing System Reference Manual‚ Prentice-Hall‚ Englewood Cliffs‚ N.J.‚ 1990. 77
Premium
OVERLAY A RCHITECTURES FOR FPGA-BASED S OFTWARE PACKET P ROCESSING by Martin Labrecque A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Electrical and Computer Engineering University of Toronto Copyright c 2011 by Martin Labrecque Abstract Overlay Architectures for FPGA-Based Software Packet Processing Martin Labrecque Doctor of Philosophy Graduate Department of Electrical and Computer Engineering University of Toronto
Premium Central processing unit Transmission Control Protocol Computer network
Circulatory system From Wikipedia‚ the free encyclopedia Jump to: navigation‚ search This article is about the organ system. For the band‚ see Circulatory System. For transport in plants‚ see Vascular tissue. Circulatory system | | The human circulatory system. Red indicates oxygenated blood‚ blue indicates deoxygenated. | Latin | systema cardiovasculare | The circulatory system is an organ system that passes nutrients (such as amino acids‚ electrolytes and lymph)‚ gases‚ hormones
Premium Heart Blood Cardiovascular system
cooling-e cient locations in the data center‚” in Proc. USENIX ATC‚ 2007. [11] D. P. Bertsekas and J. N. Tsitsiklis‚ Parallel and Distributed Computation: Numerical Methods. Athena Scientific‚ 1997. [14] S. Boyd and L. Vandenberghe‚ Convex Optimization. Cambridge University Press‚ 2004. and services research‚” in Proc. USENIX HotCloud‚ 2009. [18] Z. Cao‚ Z. Wang‚ and E. Zegura‚ “Performance of hashing-based schemes for Internet load balancing‚” in Proc. IEEE INFOCOM‚ 2000. Inte. Netw. Manag. (IM)‚ 2009
Premium Algorithm Data center Cloud computing
hoc networks‚” in Proc. IEEE ICNP‚ 2002‚ pp. 78–87. [3] Y.-C. Hu‚ A. Perrig‚ and D. Johnson‚ “Packet leashes: A defense against wormhole attacks in wireless networks‚” in Proc. IEEE INFOCOM‚ 2003‚ vol. 3‚ pp. 1976–1986. 1796 IEEE/ACM TRANSACTIONS ON NETWORKING‚ VOL. 19‚ NO. 6‚ DECEMBER 2011 [4] L. Hu and D. Evans‚ “Using directional antennas to prevent wormhole attacks‚” presented at the NDSS‚ 2004. [5] W. Wang and B. Bhargava‚ “Visualization of wormholes in sensor networks‚” in Proc. ACM WiSe‚ 2004
Premium Network topology Graph theory Computer network
References: [2] M. Guo‚ M. H. Ammar‚ E. W. Zegura‚ “V3: a vehicle-to-vehicle live video streaming architecture”‚ in Proc. of 3rd IEEE International Conference on Pervasive Computing and Communications‚ Kauai‚ HI‚ Mar. 2005. [3] N. Balan‚ J. Guo‚ “Increasing broadcast reliability in vehicular ad hoc networks‚” in Proc. of the 3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2008)‚ ACM MobiCom 2008‚ Los Angeles‚ CA‚ Sep. 2008. [5] M. Aoki‚ H. Fujii
Premium Automobile Vehicle Vehicles
” in Proc. ACM 2nd Int. Workshop Video Surveillance Sensor Networks‚ New York‚ 2004‚ pp. 46–53. [3] E. Newton‚ L. Sweeney‚ and B. Malin‚ Preserving Privacy by De-Identifying Facial Images Carnegie Mellon Univ.‚ 2003‚ Tech. Rep. CMU-CS-03-119. [4] T. E. Boult‚ “PICO: Privacy through Invertible Cryptographic Obscuration‚” in Proc. IEEE/NSF Workshop Comput. Vis. Interactive Intell. Environ.‚ Nov. 2005‚ pp. 27–38. [5] F. Dufaux and T. Ebrahimi‚ “Video Surveillance using JPEG 2000‚” in SPIE Proc. Applications
Premium Privacy Surveillance
System‚” in Proc. of IEEE Symp. Security and Privacy‚ pp. 27-40‚ 2004. [5] E. Proebstel‚ S. Riddle‚ F. Hsu‚ J. Cummins‚ F. Oakley‚ T. Stanionis‚ and M. Bishop‚ “An Analysis of the Hart Intercivic DAU eSlate‚” in Proc. of Usenix/Accurate Electronic Voting Technology Workshop‚ 2007. [6] D. Molnar‚ T. Kohno‚ N. Sastry‚ and D. Wagner‚ “Tamper-Evident‚ History Independent‚ Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract)‚” in Proc. of IEEE Symp
Premium Printed circuit board Electronic voting Voting system
To Offload or Not to Offload? The Bandwidth and Energy Costs of Mobile Cloud Computing Marco V. Barbera‚ Sokol Kosta‚ Alessandro Mei‚ and Julinda Stefa Department of Computer Science‚ Sapienza University of Rome‚ Italy Email: lastname@di.uniroma1.it Abstract—The cloud seems to be an excellent companion of mobile systems‚ to alleviate battery consumption on smartphones and to backup user’s data on-the-fly. Indeed‚ many recent works focus on frameworks that enable mobile computation offloading to
Premium Wi-Fi Personal digital assistant
new approach to diagnosing and managing projects” Part 1 of 2 Project Management World Today‚ Vol. IX‚ No. VII. 4. Remington‚ K.‚ Zolin‚ R. and Turner‚ R.‚ 2009‚ “A model of project complexity: distinguishing dimensions of complexity from severity”‚ Proc. of the 9th International Research Network of Project Management Conference‚ 11–13 October 2009‚ Berlin. 5. Chryssolouris‚ G.‚ 1994‚ “Measuring complexity in manufacturing systems”‚ Working Paper‚ Department of Mechanical Engineering and Aeronautics
Premium Project management Construction Project manager