Sciweavers

14298 search results - page 2795 / 2860
» Dynamic Languages and Applications
Sort
View
PE
2002
Springer
158views Optimization» more  PE 2002»
15 years 4 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
SIGPLAN
2002
15 years 4 months ago
Write barrier removal by static analysis
We present a new analysis for removing unnecessary write barriers in programs that use generational garbage collection. To our knowledge, this is the first static program analysis...
Karen Zee, Martin C. Rinard
TCSV
2002
134views more  TCSV 2002»
15 years 4 months ago
Factor graph framework for semantic video indexing
Video query by semantic keywords is one of the most challenging research issues in video data management. To go beyond low-level similarity and access video data content by semanti...
Milind R. Naphade, Igor Kozintsev, Thomas S. Huang
TMC
2002
118views more  TMC 2002»
15 years 4 months ago
Code Placement and Replacement Strategies for Wideband CDMA OVSF Code Tree Management
The use of OVSF codes in WCDMA systems has offered opportunities to provide variable data rates to flexibly support applications with different bandwidth requirements. Two importan...
Yu-Chee Tseng, Chih-Min Chao
TON
2002
117views more  TON 2002»
15 years 4 months ago
Generalized loop-back recovery in optical mesh networks
Current means of providing loop-back recovery, which is widely used in SONET, rely on ring topologies, or on overlaying logical ring topologies upon physical meshes. Loop-back is d...
Muriel Médard, Richard A. Barry, Steven G. ...
« Prev « First page 2795 / 2860 Last » Next »