Sciweavers

584 search results - page 103 / 117
» Design and implementation of correlating caches
Sort
View
ACTAC
1999
117views more  ACTAC 1999»
14 years 9 months ago
Limiting Distortion of a Wavelet Image Codec
A new image compression algorithm, Distortion Limited Wavelet Image Codec (DLWIC), is introduced. The codec is designed to be simple to implement, fast and have modest requirement...
Joonas Lehtinen
CCECE
2011
IEEE
13 years 9 months ago
An algorithm for object tracking based on adaptive triangle shape mesh estimation method
— Although "Adaptive Mesh" is regarded as complicating method for object tracking accompanied with many controversies and obstacles, but it has been proposed that such ...
Mahdi Koohi, Mahdi Narghi, Abbas Shakery
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
15 years 9 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
IMC
2004
ACM
15 years 3 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...
93
Voted
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
15 years 4 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...