Sciweavers

828 search results - page 145 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
IPPS
2007
IEEE
15 years 6 months ago
Optimizing the Fast Fourier Transform on a Multi-core Architecture
The rapid revolution in microprocessor chip architecture due to multicore technology is presenting unprecedented challenges to the application developers as well as system softwar...
Long Chen, Ziang Hu, Junmin Lin, Guang R. Gao
103
Voted
HPCA
2006
IEEE
16 years 3 days ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
INFOCOM
2000
IEEE
15 years 4 months ago
Egress Admission Control
—Allocating resources for multimedia traffic flows with real-time performance requirements is an important challenge for future packet networks. However, in large-scale networks,...
Coskun Cetinkaya, Edward W. Knightly
IJAR
2008
118views more  IJAR 2008»
14 years 11 months ago
Dynamic multiagent probabilistic inference
Cooperative multiagent probabilistic inference can be applied in areas such as building surveillance and complex system diagnosis to reason about the states of the distributed unc...
Xiangdong An, Yang Xiang, Nick Cercone
AAAI
2006
15 years 1 months ago
Extracting Knowledge about Users' Activities from Raw Workstation Contents
A long-standing goal of AI is the development of intelligent workstation-based personal agents to assist users in their daily lives. A key impediment to this goal is the unrealist...
Tom M. Mitchell, Sophie H. Wang, Yifen Huang, Adam...