Sciweavers

226 search results - page 1 / 46
» The Wide Trail Design Strategy
Sort
View
IMA
2001
Springer
91views Cryptology» more  IMA 2001»
13 years 9 months ago
The Wide Trail Design Strategy
n, important for interoperability only. We can make abstraction from the representation of the elements of GF(28 ) and consider a block cipher that operates on strings of elements ...
Joan Daemen, Vincent Rijmen
PERCOM
2008
ACM
13 years 5 months ago
An application framework for mobile, context-aware trails
In this paper 1 we describe the design, implementation and evaluation of a software framework that supports the development of mobile, context-aware trails-based applications. A t...
Cormac Driver, Siobhán Clarke
HCI
2009
13 years 3 months ago
Trail Patterns in Social Tagging Systems: Role of Tags as Digital Pheromones
The popularity of social information systems has been driven by their ability to help users manage, organize and share online resources. Though the research exploring the use of ta...
Thomas George Kannampallil, Wai-Tat Fu
LCPC
2004
Springer
13 years 10 months ago
Branch Strategies to Optimize Decision Trees for Wide-Issue Architectures
Abstract. Branch predictors are associated with critical design issues for nowadays instruction greedy processors. We study two important domains where the optimization of decision...
Patrick Carribault, Christophe Lemuet, Jean-Thomas...
ICPP
2007
IEEE
13 years 11 months ago
Achieving Reliability through Replication in a Wide-Area Network DHT Storage System
It is a challenge to design and implement a wide-area distributed hash table (DHT) which provides a storage service with high reliability. Many existing systems use replication to...
Jing Zhao, Hongliang Yu, Kun Zhang, Weimin Zheng, ...