Sciweavers

2157 search results - page 37 / 432
» Optimal Fast Hashing
Sort
View
FAST
2003
15 years 4 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
IPTPS
2003
Springer
15 years 8 months ago
On the Feasibility of Peer-to-Peer Web Indexing and Search
This paper discusses the feasibility of peer-to-peer full-text keyword search of the Web. Two classes of keyword search techniques are in use or have been proposed: flooding of q...
Jinyang Li, Boon Thau Loo, Joseph M. Hellerstein, ...
ISCAS
2006
IEEE
73views Hardware» more  ISCAS 2006»
15 years 9 months ago
Rate-distortion optimization for fast hierarchical B-picture transcoding
— an efficient rate-distortion (R-D) optimal method for transcoding hierarchical B-pictures is proposed in this paper. A new R-D model is presented for fast transcoding hierarchi...
Huifeng Shen, Xiaoyan Sun, Feng Wu, Shipeng Li
CGO
2009
IEEE
15 years 9 months ago
Fast Track: A Software System for Speculative Program Optimization
—Fast track is a software speculation system that enables unsafe optimization of sequential code. It speculatively runs optimized code to improve performance and then checks the ...
Kirk Kelsey, Tongxin Bai, Chen Ding, Chengliang Zh...