Sciweavers

18188 search results - page 3530 / 3638
» Evaluation for Collaborative Systems
Sort
View
106
Voted
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 7 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
VTC
2006
IEEE
15 years 7 months ago
Throughput Performance of Iterative Frequency-Domain SIC with 2D MMSE-FDE for SC-MIMO Multiplexing
— Broadband wireless packet access will be the core technology of the next generation mobile communication systems. For very high-speed and high-quality packet transmissions in a...
Akinori Nakajima, Fumiyuki Adachi
111
Voted
ADBIS
2006
Springer
182views Database» more  ADBIS 2006»
15 years 7 months ago
A Middleware-Based Approach to Database Caching
Database caching supports declarative query processing close to the application. Using a full-fledged DBMS as cache manager, it enables the evaluation of specific project-select-...
Andreas Bühmann, Theo Härder, Christian ...
118
Voted
CASES
2006
ACM
15 years 7 months ago
Limitations of special-purpose instructions for similarity measurements in media SIMD extensions
Microprocessor vendors have provided special-purpose instructions such as psadbw and pdist to accelerate the sumof-absolute differences (SAD) similarity measurement. The usefulne...
Asadollah Shahbahrami, Ben H. H. Juurlink, Stamati...
DAC
2006
ACM
15 years 7 months ago
Signature-based workload estimation for mobile 3D graphics
Until recently, most 3D graphics applications had been regarded as too computationally intensive for devices other than desktop computers and gaming consoles. This notion is rapid...
Bren Mochocki, Kanishka Lahiri, Srihari Cadambi, X...
« Prev « First page 3530 / 3638 Last » Next »