Sciweavers

2514 search results - page 128 / 503
» Design, Implementation, and Evaluation of a Digital Lectern ...
Sort
View
USENIX
2003
15 years 3 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
SIGCOMM
2009
ACM
15 years 8 months ago
OLS: opportunistic localization system for smart phones devices
In this paper, we describe the opportunistic localization, which enables localization services that works seamlessly in heterogeneous environments including indoors as oppose to G...
Martin Klepal, Maarten Weyn, Warsun Najib, Inge By...
SIGIR
2010
ACM
15 years 5 months ago
Reusable test collections through experimental design
Portable, reusable test collections are a vital part of research and development in information retrieval. Reusability is difficult to assess, however. The standard approach— si...
Ben Carterette, Evangelos Kanoulas, Virgiliu Pavlu...
OOPSLA
2010
Springer
15 years 2 days ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu
JSA
2010
173views more  JSA 2010»
14 years 8 months ago
Hardware/software support for adaptive work-stealing in on-chip multiprocessor
During the past few years, embedded digital systems have been requested to provide a huge amount of processing power and functionality. A very likely foreseeable step to pursue th...
Quentin L. Meunier, Frédéric P&eacut...