Sciweavers

3037 search results - page 515 / 608
» A High Performance Application Representation for Reconfigur...
Sort
View
P2P
2010
IEEE
127views Communications» more  P2P 2010»
14 years 12 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
ICDCN
2010
Springer
15 years 8 months ago
An Intelligent IT Infrastructure for the Future
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...
Prith Banerjee
ICSM
2003
IEEE
15 years 7 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
ICC
2007
IEEE
15 years 5 months ago
CS-CDMA/CP with M-ZCZ Codes Over a Multipath Fading Channel with Excess Spreads
Convolutional spreading CDMA with cyclic prefix (CS-CDMA/CP) enables multiuser interference-free (MUI-free) transmission over multipath channels with the use of zero correlation zo...
Nalin S. Weerasinghe, Takeshi Hashimoto
ICCV
2011
IEEE
14 years 2 months ago
DTAM: Dense Tracking and Mapping in Real-Time
DTAM is a system for real-time camera tracking and reconstruction which relies not on feature extraction but dense, every pixel methods. As a single hand-held RGB camera flies ov...
Richard A. Newcombe, Steven Lovegrove, Andrew J. D...