Sciweavers

2863 search results - page 544 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
EUROCRYPT
2004
Springer
15 years 7 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
127
Voted
HIPEAC
2009
Springer
15 years 9 months ago
Hybrid Super/Subthreshold Design of a Low Power Scalable-Throughput FFT Architecture
In this article, we present a parallel implementation of a 1024 point Fast Fourier Transform (FFT) operating with a subthreshold supply voltage, which is below the voltage that tur...
Michael B. Henry, Leyla Nazhandali
ICMCS
2006
IEEE
154views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Implementation and Evolution of Packet Striping for Media Streaming Over Multiple Burst-Loss Channels
Modern mobile devices are multi-homed with WLAN and WWAN communication interfaces. In a community of nodes with such multihomed devices — locally inter-connected via high-speed ...
Gene Cheung, Puneet Sharma, Sung-Ju Lee
118
Voted
USENIX
2008
15 years 4 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
131
Voted
INFOCOM
2012
IEEE
13 years 4 months ago
Network optimization for DHT-based applications
—P2P platforms have been criticized because of the heavy strain that some P2P services can inflict on costly interdomain links of network operators. It is therefore necessary to...
Yi Sun, Yang Richard Yang, Xiaobing Zhang, Yang Gu...