Sciweavers

5056 search results - page 475 / 1012
» Network Coding Theory
Sort
View
CODES
2003
IEEE
15 years 10 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang
178
Voted
IJON
2008
168views more  IJON 2008»
15 years 5 months ago
Spatial relationship representation for visual object searching
Image representation has been a key issue in vision research for many years. In order to represent various local image patterns or objects effectively, it is important to study th...
Jun Miao, Lijuan Duan, Laiyun Qing, Wen Gao, Xilin...
CONCURRENCY
2000
155views more  CONCURRENCY 2000»
15 years 4 months ago
Annotating Java class files with virtual registers for performance
The Java .class file is a compact encoding of programs for a stack-based virtual machine. It is intended for use in a networked environment, which requires machine independence an...
Joel Jones, Samuel N. Kamin
CBSE
2011
Springer
14 years 5 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
WWW
2004
ACM
16 years 5 months ago
The webgraph framework I: compression techniques
Studying Web graphs is often difficult due to their large size. Recently, several proposals have been published about various techniques that allow to store a Web graph in memory ...
Paolo Boldi, Sebastiano Vigna