Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,015 Full-Text Articles 1,335 Authors 428,562 Downloads 104 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,015 full-text articles. Page 39 of 39.

Enterprise Development Policies And Capacity-Building In Science, Technology And Innovation (Sti)-Response To The Issue Note, Deogratias Harorimana 2010 The University of the South Pacific

Enterprise Development Policies And Capacity-Building In Science, Technology And Innovation (Sti)-Response To The Issue Note, Deogratias Harorimana

Dr Deogratias Harorimana

Enterprise Development, Investment and Business Climate are all important for economic growth. But what policies, strategies are needed to make economic growth a reality. The author has followed one of the World's fastest reformer and emerging nation in the Heart of Africa-Rwanda. The paper shares lessons and practical aspects related to building an entrepreneurial population, and building a government which is a facilitator of business climate


Explaining Cache Ser Anomaly Using Relative Due Avf Measurement, Arijit Biswas, Charles Recchia, Shubhendu Mukherjee, Vinod Ambrose, Leo Chan, Aamer Jaleel, Mike Plaster, Norbert Seifert 2010 SelectedWorks

Explaining Cache Ser Anomaly Using Relative Due Avf Measurement, Arijit Biswas, Charles Recchia, Shubhendu Mukherjee, Vinod Ambrose, Leo Chan, Aamer Jaleel, Mike Plaster, Norbert Seifert

Charles H Recchia

No abstract provided.


Survey Report On Training And Spending On Customer Care Services, Deogratias Harorimana Sr 2010 The University of the South Pacific

Survey Report On Training And Spending On Customer Care Services, Deogratias Harorimana Sr

Dr Deogratias Harorimana

In a bid to promote and develop good customer care service in various sectors of Rwandan economy, a survey was conducted to assess progress and trends on customer service capacity building. Although shortcomings are there, there have been efforts and registered trends across the country on service delivery front. Investment in Capacity Building IS happening in certain sectors but this is unevenly distributed. In 2008 companies had started recognizing the significance of good service and cultivate a good working environment and training. From 2009, there was a decline in investment in capacity building in front office and key service delivery ...


Post Silicon Clock Tuning System To Mitigate The Impact Of Process Variation On Performance, Kelageri Nagaraj 2010 University of Massachusetts Amherst

Post Silicon Clock Tuning System To Mitigate The Impact Of Process Variation On Performance, Kelageri Nagaraj

Masters Theses 1911 - February 2014

Optical shrink for process migration, manufacturing process variation and dynamic voltage control leads to clock skew as well as path delay variation in a manufactured chip. Since such variations are difficult to predict in pre-silicon phase, tunable clock buffers have been used in several microprocessor designs. The buffer delays are tuned to improve maximum operating clock frequency of a design. This however shifts the burden of finding tuning settings for individual clock buffers to the test process. In this project, we describe a process of using tester measurements to determine the settings of the tunable buffers for recovery of performance ...


The Changing Patterns Of Internet Usage, Christopher S. Yoo 2010 University of Pennsylvania Law School

The Changing Patterns Of Internet Usage, Christopher S. Yoo

Faculty Scholarship at Penn Law

The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might ...


Explaining Cache Ser Anomaly Using Relative Due Avf Measurement, Arijit Biswas, Charles H. Recchia, Shubhendu S. Mukherjee, Vinod Ambrose, Leo Chan, Aamer Jaleel, Mike Plaster, Norbert Seifert 2010 Worcester Polytechnic Institute

Explaining Cache Ser Anomaly Using Relative Due Avf Measurement, Arijit Biswas, Charles H. Recchia, Shubhendu S. Mukherjee, Vinod Ambrose, Leo Chan, Aamer Jaleel, Mike Plaster, Norbert Seifert

Physics Faculty Publications

No abstract provided.


Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo 2010 University of Pennsylvania Law School

Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo

Faculty Scholarship at Penn Law

The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others ...


Application Planning, Jochen Albrecht, Clare Davies 2010 CUNY Hunter College

Application Planning, Jochen Albrecht, Clare Davies

Publications and Research

No abstract provided.


Defending Privacy: The Development And Deployment Of A Darknet, Conor McManamon, Fredrick Mtenzi 2010 Dublin Institute of Technology

Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi

Conference papers

New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined in the context of file sharing as a network which operates on top of another network such as the Internet for the purpose ...


Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat 2010 Old Dominion University

Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat

Electrical & Computer Engineering Theses & Disssertations

In this dissertation, transmitter adaptation for optimal resource allocation in wireless communication systems are investigated. First, a multiple access channel model is considered where many transmitters communicate with a single receiver. This scenario is a basic component of a. wireless network in which multiple users simultaneously access the resources of a wireless service provider. Adaptive algorithms for transmitter optimization to meet Quality-of-Service (QoS) requirements in a distributed manner are studied. Second, an interference channel model is considered where multiple interfering transmitter-receiver pairs co-exist such that a given transmitter communicates with its intended receiver in the presence of interference from other ...


Embedded Systems As Datacenters, Robert Iannucci 2009 RAI Laboratory LLC

Embedded Systems As Datacenters, Robert Iannucci

Robert A Iannucci

No abstract provided.


Using A Majority Voting Hardware Method On Weather Information To Increase The Accuracy Of Decision Making Methods, Sanaz Asadinia 2009 University of Arak,Iran

Using A Majority Voting Hardware Method On Weather Information To Increase The Accuracy Of Decision Making Methods, Sanaz Asadinia

Sanaz Asadinia

No abstract provided.


A Hybrid Routing Algorithm Based On Ant Colony And Zhls Routing Protocol For Manet, Marjan Rafsanjani, Sanaz Asadinia, Farzaneh Pakzad 2009 University of Arak,Iran

A Hybrid Routing Algorithm Based On Ant Colony And Zhls Routing Protocol For Manet, Marjan Rafsanjani, Sanaz Asadinia, Farzaneh Pakzad

Sanaz Asadinia

Mobile Ad hoc networks (MANETs) require dynamic routing schemes for adequate performance. This paper, presents a new routing algorithm for MANETs, which combines the idea of ant colony optimization with Zone-based Hierarchical Link State (ZHLS) protocol. Ant colony optimization (ACO) is a class of Swarm Intelligence (SI) algorithms. SI is the local interaction of many simple agents to achieve a global goal. SI is based on social insect for solving different types of problems. ACO algorithm uses mobile agents called ants to explore network. Ants help to find paths between two nodes in the network. Our algorithm is based on ...


Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger 2009 University of Central Florida

Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger

J. Philip Craiger, Ph.D.

The Sony PlayStation 3 (PS3) is a powerful gaming console that supports Internet-related activities, local file storage and the playing of Blu-ray movies. The PS3 also allows users to partition and install a secondary operating system on the hard drive. This “desktop-like” functionality along with the encryption of the primary hard drive containing the gaming software raises significant issues related to the forensic analysis of PS3 systems. This paper discusses the PS3 architecture and behavior, and provides recommendations for conducting forensic investigations of PS3 systems.


Upper Bounds On The Number Of Channels To Ensure Collision-Free Communications In Multi-Channel Wireless Networks Using Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu 2009 Macau University of Science and Technology

Upper Bounds On The Number Of Channels To Ensure Collision-Free Communications In Multi-Channel Wireless Networks Using Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

Recent studies have found that using multiple channels can separate concurrent transmissions and significantly improve network throughput. However, these studies have only considered wireless nodes that are equipped with omni-directional antennas, which have high interference. On the other hand, other researchers have found that using directional antennas in wireless networks can reduce interference and improve the network performance. But their studies have only considered single channel to be used in wireless networks with directional antennas. Thus, integrating the two technologies of multiple channels and directional antennas together can potentially bring more benefits. Some previous works have studies the capacity on ...


Digital Commons powered by bepress