Sciweavers

15253 search results - page 2762 / 3051
» Integer-Programming Software Systems
Sort
View
COMSWARE
2006
IEEE
15 years 10 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
146
Voted
COMSWARE
2006
IEEE
15 years 10 months ago
Design keys to adapt web prefetching algorithms to environment conditions
— This paper focuses on the design process of web prefetching algorithms. The main goal of prefetching techniques in web is to reduce user perceived latency. Since these techniqu...
Josep Domènech, Julio Sahuquillo, Ana Pont,...
131
Voted
COMSWARE
2006
IEEE
15 years 10 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
145
Voted
CRV
2006
IEEE
206views Robotics» more  CRV 2006»
15 years 10 months ago
Toward an Application of Content-Based Video Indexing to Computer- Assisted Descriptive Video
This paper presents the status of a project targeting the development of content-based video indexing tools, to assist a human in the generation of descriptive video for the hard ...
Langis Gagnon, France Laliberté, Marc Lalon...
142
Voted
DATE
2006
IEEE
123views Hardware» more  DATE 2006»
15 years 10 months ago
Constructing portable compiled instruction-set simulators: an ADL-driven approach
Instruction set simulators are common tools used for the development of new architectures and embedded software among countless other functions. This paper presents a framework th...
Joseph D'Errico, Wei Qin
« Prev « First page 2762 / 3051 Last » Next »