Sciweavers

24529 search results - page 4656 / 4906
» Computing on Authenticated Data
Sort
View
MICRO
2003
IEEE
166views Hardware» more  MICRO 2003»
15 years 9 months ago
Razor: A Low-Power Pipeline Based on Circuit-Level Timing Speculation
With increasing clock frequencies and silicon integration, power aware computing has become a critical concern in the design of embedded processors and systems-on-chip. One of the...
Dan Ernst, Nam Sung Kim, Shidhartha Das, Sanjay Pa...
ACMICEC
2003
ACM
182views ECommerce» more  ACMICEC 2003»
15 years 9 months ago
eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments
In recent years, the growth of Mobile Computing, Electronic Commerce and Mobile Electronic Commerce has created a new concept of Mobile Electronic Marketing. New marketing models ...
Olga Ratsimor, Timothy W. Finin, Anupam Joshi, Yel...
COMPGEOM
2003
ACM
15 years 9 months ago
Cost-driven octree construction schemes: an experimental study
Given a scene consisting of objects, ray shooting queries answer with the first object encountered by a given ray, and are used in ray tracing and radiosity for rendering photo-r...
Boris Aronov, Hervé Brönnimann, Allen ...
HT
2003
ACM
15 years 9 months ago
Enhanced web document summarization using hyperlinks
This paper addresses the issue of Web document summarization. As textual content of Web documents is often scarce or irrelevant and existing summarization techniques are based on ...
Jean-Yves Delort, Bernadette Bouchon-Meunier, Mari...
125
Voted
MM
2003
ACM
118views Multimedia» more  MM 2003»
15 years 9 months ago
PROMISE: peer-to-peer media streaming using CollectCast
We present the design, implementation, and evaluation of PROMISE, a novel peer-to-peer media streaming system encompassing the key functions of peer lookup, peer-based aggregated ...
Mohamed Hefeeda, Ahsan Habib, Boyan Botev, Dongyan...
« Prev « First page 4656 / 4906 Last » Next »