Sciweavers

12562 search results - page 2202 / 2513
» Distributed Xbean Applications
Sort
View
122
Voted
VLDB
2004
ACM
100views Database» more  VLDB 2004»
15 years 9 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
149
Voted
MIR
2010
ACM
217views Multimedia» more  MIR 2010»
15 years 9 months ago
Feature selection for content-based, time-varying musical emotion regression
In developing automated systems to recognize the emotional content of music, we are faced with a problem spanning two disparate domains: the space of human emotions and the acoust...
Erik M. Schmidt, Douglas Turnbull, Youngmoo E. Kim
126
Voted
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
15 years 9 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
143
Voted
CLUSTER
2003
IEEE
15 years 9 months ago
Coordinated Checkpoint versus Message Log for Fault Tolerant MPI
— Large Clusters, high availability clusters and Grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programmin...
Aurelien Bouteiller, Pierre Lemarinier, Gér...
CLUSTER
2003
IEEE
15 years 9 months ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen
« Prev « First page 2202 / 2513 Last » Next »