Sciweavers

6409 search results - page 1227 / 1282
» A Computational Algorithm for Origami Design
Sort
View
SAC
2009
ACM
15 years 4 months ago
Points-to analysis for JavaScript
JavaScript is widely used by web developers and the complexity of JavaScript programs has increased over the last year. Therefore, the need for program analysis for JavaScript is ...
Dongseok Jang, Kwang-Moo Choe
CCS
2009
ACM
15 years 4 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
ICALP
2009
Springer
15 years 4 months ago
Popular Mixed Matchings
We study the problem of matching applicants to jobs under one-sided preferences; that is, each applicant ranks a non-empty subset of jobs under an order of preference, possibly inv...
Telikepalli Kavitha, Julián Mestre, Meghana...
ICCSA
2009
Springer
15 years 4 months ago
VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802.15.4 Systems
Supporting multimedia traffic is one of the major challenges for the next generation of wireless personal area networks (WPANs). Especially, the IEEE 802.15.4 WPAN standards specif...
Junwoo Jung, Hoki Baek, Jaesung Lim
INFOCOM
2009
IEEE
15 years 4 months ago
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...
Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Na...
« Prev « First page 1227 / 1282 Last » Next »