Sciweavers

4403 search results - page 830 / 881
» Galois Theory of Algorithms
Sort
View
APSCC
2008
IEEE
15 years 6 months ago
Integration and Implementation of Secured IP Based Surveillance Networks
— This paper presents a method of integration and implementation of transmitting video and audio data from multiple Internet Protocol (IP) surveillance cameras in a wireless sens...
Charles C. Castello, Jeffrey Fan, Te-Shun Chou, Ho...
HPDC
2008
IEEE
15 years 6 months ago
Improving peer connectivity in wide-area overlays of virtual workstations
Self-configuring virtual networks rely on structured P2P routing to provide seamless connectivity among nodes through overlay routing of virtual IP packets, support decentralized...
Arijit Ganguly, P. Oscar Boykin, David Wolinsky, R...
IDEAS
2008
IEEE
80views Database» more  IDEAS 2008»
15 years 6 months ago
Improved count suffix trees for natural language data
With more and more natural language text stored in databases, handling respective query predicates becomes very important. Optimizing queries with predicates includes (sub)string ...
Guido Sautter, Cristina Abba, Klemens Böhm
NDSS
2008
IEEE
15 years 6 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 6 months ago
Design Linear Multiuser Transmitters from Linear Multiuser Receivers
— Novel concepts are introduced for finding the relationship between multiuser detection (MUD) and multiuser transmission (MUT), so that the study in MUT can benefit from the w...
Lie-Liang Yang