Sciweavers

733 search results - page 121 / 147
» Measurements, Analysis, and Modeling of BitTorrent-like Syst...
Sort
View
CCS
2001
ACM
15 years 4 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
DOCENG
2005
ACM
15 years 1 months ago
Generative semantic clustering in spatial hypertext
This paper presents an iterative method for generative semantic clustering of related information elements in spatial hypertext documents. The goal is to automatically organize th...
Andruid Kerne, Eunyee Koh, Vikram Sundaram, J. Mic...
BMCBI
2006
127views more  BMCBI 2006»
14 years 12 months ago
A graph-search framework for associating gene identifiers with documents
Background: One step in the model organism database curation process is to find, for each article, the identifier of every gene discussed in the article. We consider a relaxation ...
William W. Cohen, Einat Minkov
LCTRTS
2004
Springer
15 years 5 months ago
Feedback driven instruction-set extension
Application specific instruction-set processors combine an efficient general purpose core with special purpose functionality that is tailored to a particular application domain. ...
Uwe Kastens, Dinh Khoi Le, Adrian Slowik, Michael ...
ENTCS
2008
146views more  ENTCS 2008»
14 years 12 months ago
Probabilistic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions
istic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions Michael J. A. Smith1 ,2 Laboratory for Foundations of Computer Science University of Edinb...
Michael J. A. Smith