Sciweavers

14078 search results - page 2606 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
145
Voted
WWW
2008
ACM
16 years 4 months ago
A systematic approach for cell-phone worm containment
Cell phones are increasingly becoming attractive targets of various worms, which cause the leakage of user privacy, extra service charges and depletion of battery power. In this w...
Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu
118
Voted
WWW
2005
ACM
16 years 4 months ago
Multi-step media adaptation: implementation of a knowledge-based engine
Continuing changes in the domains of consumer devices and multimedia formats demand for a new approach to media adaptation. The publication of customized content on a device requi...
Peter Soetens, Matthias De Geyter
137
Voted
WWW
2004
ACM
16 years 4 months ago
Site-to-site (s2s) searching using the p2p framework with cgi
Peer-To-Peer (P2P) networks like Gnutella improve some shortcomings of Conventional Search Engines (CSE) such as centralized and outdated indexing by distributing the search engin...
Wan Yeung Wong
129
Voted
VLSID
2007
IEEE
153views VLSI» more  VLSID 2007»
16 years 4 months ago
Extracting Logic Circuit Structure from Conjunctive Normal Form Descriptions
Boolean Satisfiability is seeing increasing use as a decision procedure in Electronic Design Automation (EDA) and other domains. Most applications encode their domain specific cons...
Zhaohui Fu, Sharad Malik
147
Voted
VLSID
2004
IEEE
292views VLSI» more  VLSID 2004»
16 years 4 months ago
NoCGEN: A Template Based Reuse Methodology for Networks on Chip Architecture
In this paper, we describe NoCGEN, a Network On Chip (NoC) generator, which is used to create a simulatable and synthesizable NoC description. NoCGEN uses a set of modularised rou...
Jeremy Chan, Sri Parameswaran
« Prev « First page 2606 / 2816 Last » Next »