Sciweavers

5583 search results - page 1070 / 1117
» Application of Micro-Genetic Algorithm for Task Based Comput...
Sort
View
DIM
2005
ACM
15 years 2 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
112
Voted
DAGSTUHL
2006
15 years 1 months ago
Taming Dynamic and Selfish Peers
This paper addresses two important challenges for current P2P systems, namely churn and selfishness. First, we report on a system [19] whose desirable properties (small peer degre...
Stefan Schmid, Fabian Kuhn, Thomas Moscibroda, Rog...
119
Voted
SIGCOMM
2010
ACM
15 years 23 days ago
Flexible multimedia content retrieval using InfoNames
Multimedia content is a dominant fraction of Internet usage today. At the same time, there is significant heterogeneity in video presentation modes and operating conditions of Int...
Arun Kumar, Ashok Anand, Aditya Akella, Athula Bal...
89
Voted
DAC
2004
ACM
16 years 1 months ago
Efficient power/ground network analysis for power integrity-driven design methodology
As technology advances, the metal width is decreasing with the length increasing, making the resistance along the power line increase substantially. Together with the nonlinear sc...
Su-Wei Wu, Yao-Wen Chang
105
Voted
ISBI
2004
IEEE
16 years 1 months ago
Fast Multiresolution Photon-Limited Image Reconstruction
The techniques described in this paper allow multiscale photon-limited image reconstruction methods to be implemented with significantly less computational complexity than previou...
Rebecca Willett, Robert Nowak
« Prev « First page 1070 / 1117 Last » Next »