Sciweavers

2263 search results - page 145 / 453
» Measurement and analysis of LDAP performance
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding
— While the practical coding scheme [1] has been shown to be able to improve throughput of wireless networks, there still lacks fundamental understanding on how the coding scheme...
Jilin Le, John C. S. Lui, Dah-Ming Chiu
91
Voted
PLDI
2010
ACM
15 years 3 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...
MIR
2006
ACM
150views Multimedia» more  MIR 2006»
15 years 4 months ago
Exploring temporal consistency for video analysis and retrieval
Temporal consistency is ubiquitous in video data, where temporally adjacent video shots usually share similar visual and semantic content. This paper presents a thorough study of ...
Jun Yang 0003, Alexander G. Hauptmann
75
Voted
INFOCOM
2006
IEEE
15 years 4 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
15 years 3 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques