Sciweavers

24529 search results - page 4683 / 4906
» Computing on Authenticated Data
Sort
View
ECOOPW
2008
Springer
15 years 5 months ago
Getting Farther on Software Evolution via AOP and Reflection
Following last four years' RAM-SE (Reflection, AOP and Meta-Data for Software Evolution) workshop at the ECOOP conference, the RAM-SE'08 workshop was a successful and pop...
Manuel Oriol, Walter Cazzola, Shigeru Chiba, Gunte...
ETRA
2008
ACM
235views Biometrics» more  ETRA 2008»
15 years 5 months ago
Using semantic content as cues for better scanpath prediction
Under natural viewing conditions, human observers use shifts in gaze to allocate processing resources to subsets of the visual input. There are many computational models that try ...
Moran Cerf, E. Paxon Frady, Christof Koch
EURONGI
2008
Springer
15 years 5 months ago
Interference-Aware Channel Assignment in Wireless Mesh Networks
DED ABSTRACT The increased popularity and the growth in the number of deployed IEEE 802.11 Access Points (APs) have raised the opportunity to merge together various disjointed wire...
Rosario Giuseppe Garroppo, Stefano Giordano, David...
EUROPAR
2008
Springer
15 years 5 months ago
MPC: A Unified Parallel Runtime for Clusters of NUMA Machines
Over the last decade, Message Passing Interface (MPI) has become a very successful parallel programming environment for distributed memory architectures such as clusters. However, ...
Marc Pérache, Hervé Jourdren, Raymon...
IMC
2007
ACM
15 years 5 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
« Prev « First page 4683 / 4906 Last » Next »