Sciweavers

24188 search results - page 383 / 4838
» Computing on Encrypted Data
Sort
View
CODES
2008
IEEE
15 years 11 months ago
Holistic design and caching in mobile computing
We utilize application trends analysis, focused on webpage content, in order to examine the design of mobile computers more holistically. We find that both Internet bandwidth and ...
Mwaffaq Otoom, JoAnn M. Paul
ICPR
2008
IEEE
15 years 11 months ago
Real-time update of 3D deformable models for computer aided liver surgery
Providing accurate image-guidance for soft-tissue interventions remains a complex task. Most of the time, preoperative models and planning data are no more valid during the surgic...
Benoît Dagon, Charles Baur, Vincent Bettscha...
WCNC
2008
IEEE
15 years 11 months ago
Computing TCP Throughput in a UMTS Network
— We compute the throughput obtained by a TCP connection in a UMTS environment. For downloading data at a mobile terminal, the packets of each TCP connection are stored in separa...
Kunde Anand, Vinod Sharma
ICCCN
2007
IEEE
15 years 11 months ago
Reduction of Frame Memory Accesses and Motion Estimation Computations in MPEG Video Encoder
—This paper presents an approach that reuses data stored in the frame memory and in the motion estimation (ME) internal buffer to avoid unnecessary memory accesses and redundant ...
Wei-Cheng Lin, Chung-Ho Chen
LICS
2007
IEEE
15 years 11 months ago
Relational Parametricity for Computational Effects
According to Strachey, a polymorphic program is parametric if it applies a uniform algorithm independently of the type instantiations at which it is applied. The notion of relatio...
Rasmus Ejlers Møgelberg, Alex Simpson