Wireless technology has become very widely used; and an array of security measures, such as authentication, confidentiality strategies, and 802.11 wireless communication protocol …
NR Bodke, JS Khule, PU Shinde, SN Kapse… - 2015 - academia.edu
Because of the privacy-preserving, data hiding is a new technique that had drawn attention. Access control and transaction tracking, data hiding techniques can be used to insert a …
To meet increasing and widely varying demands from different types of applications, modern embedded systems combine different types of compute resources, such as general purpose …
The rapid technological advances and the inherent need of most of today's applications for high quality results within strict timing constraints, have made the use of distributed real-time …
D Luong, Y Lu, J Deogun, S Goddard - 3rd International Multi-Conference …, 2010 - iiis.org
Abstract Quality of Service (QoS) provisioning for divisible loads in clusters, enabled using real-time scheduling theory, is based on an important assumption: the scheduler knows the …
SC Chen, CH Hsu, CT Chiu - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
Grid computing integrates scattered clusters, servers, storages and networks in different geographic locations to form a virtual super-computer. Along with the development of grid …
Providing QoS and performance guarantees to arbitrarily divisible loads has become a significant problem for many cluster-based research computing facilities. While progress is …