How does processor MHz relate to end-user performance? II. Memory subsystem and instruction set

IEEE Micro ◽  
1993 ◽  
Vol 13 (5) ◽  
pp. 79-89 ◽  
Author(s):  
S.W. White ◽  
P.D. Hester ◽  
J.W. Kemp ◽  
G.J. McWilliams
IEEE Micro ◽  
1993 ◽  
Vol 13 (4) ◽  
pp. 8-16 ◽  
Author(s):  
S.W. White ◽  
P.D. Hester ◽  
J.W. Kemp ◽  
G.J. McWilliams

Author(s):  
Saba Al-Rubaye ◽  
John Cosmas

This chapter studies the application of femtocells as part of the future cognitive 4G networks. It starts with a demonstration for the evolution of cellular and wireless networks. The developing technology that leads towards a converged LTE-Femtocell wireless environment is described in detail. The chapter presents the key challenges of deploying cognitive femtocell in the macrocell networks. As spectrum utilisation management is the main concern in the future network, the main models for spectrum allocation used to provide enough bandwidth to the femtocell in coexistence with the LTE systems are incorporated for further investigation. In addition, the Quality of Service (QoS) provisioning and the main approaches for measuring end user performance are given as function small range transmission domains. The requirement of an effective mobility management solution in such systems is analysed for future development. The chapter is concluded with a summary.


2021 ◽  
Author(s):  
Jasmina McMenamy ◽  
Thomas Haustein ◽  
Irene Macaluso

Integrated access and bachhaul (IAB), introduced in 3GPP Release 16, is expected to be one of the main enablers for dense deployments in mmWave spectrum. The IAB architecture brings in topology changes, which impact network-related aspects, such as ensuring robust routing of traffic and load-balancing. While an IAB network should be transparent to the UE, its topology design may affect the end-user performance. Of particular importance in these first releases, hence, is to determine and evaluate optimal IAB topologies. This paper addresses optimal organisation of IAB nodes by considering a number of inter-connected aspects, including maximum number of hops, path-length, load balancing between the IAB-donors and traffic demand in the access network. In that, we focus on one of the parameters most sensitive to the architectural changes in the network - delay. Our analysis relies on the connectivity graph obtained by considering some practical aspects of sectorised beamforming using real mmWave antenna patterns.


1992 ◽  
Vol 3 (4) ◽  
pp. 4-16 ◽  
Author(s):  
Prashant Palvia ◽  
Chechen Liao ◽  
Pui-Lai To

2008 ◽  
pp. 2266-2273
Author(s):  
I. M. Jawahar

Over the last decade, end-user computing has become an integral part of the organizational landscape. The emergence of end-user computing can be attributed to the necessity to manage and to effectively use information to function in a knowledge-based economy. Because of the increased organizational computing needs, computer literacy requirements have skyrocketed for clerical and support staff and for many middle and senior management positions (Bowman, Grupe, & Simkin, 1995). The proliferation of microcomputers and the availability of sophisticated user application tools (Shayo, Guthrie, & Igbaria, 1999) have facilitated the widespread implementation of end-user computing technology.


2008 ◽  
pp. 2114-2129
Author(s):  
Merrill Warkentin

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


Author(s):  
I. M. Jawahar

Over the last decade, end-user computing has become an integral part of the organizational landscape. The emergence of end-user computing can be attributed to the necessity to manage and to effectively use information to function in a knowledge-based economy. Because of the increased organizational computing needs, computer literacy requirements have skyrocketed for clerical and support staff and for many middle and senior management positions (Bowman, Grupe, & Simkin, 1995). The proliferation of microcomputers and the availability of sophisticated user application tools (Shayo, Guthrie, & Igbaria, 1999) have facilitated the widespread implementation of end-user computing technology.


Sign in / Sign up

Export Citation Format

Share Document