Sciweavers

7865 search results - page 1423 / 1573
» Peer-to-Peer Data Management
Sort
View
GLVLSI
2008
IEEE
183views VLSI» more  GLVLSI 2008»
14 years 11 months ago
An analytical model for the upper bound on temperature differences on a chip
The main contribution of this work is an analytical model for finding the upper bound on the temperature difference among various locations on the die. The proposed model can be u...
Shervin Sharifi, Tajana Simunic Rosing
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
14 years 11 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
EICS
2010
ACM
14 years 10 months ago
Seamless integration of heterogeneous UI components
Component-based software engineering is a paradigm aiming at better ways to reuse existing code and to distribute work across teams. Integrating UI components developed with diffe...
Heiko Paulheim, Atila Erdogan
SIGCOMM
2010
ACM
14 years 10 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
SIGCOMM
2010
ACM
14 years 10 months ago
Scalable flow-based networking with DIFANE
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for fl...
Minlan Yu, Jennifer Rexford, Michael J. Freedman, ...
« Prev « First page 1423 / 1573 Last » Next »