Sciweavers

6666 search results - page 1250 / 1334
» Reconfigurable Computing for High Performance Networking App...
Sort
View
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 4 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
ICDCS
2007
IEEE
15 years 4 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...
SEMCO
2007
IEEE
15 years 4 months ago
Lexical and Discourse Analysis of Online Chat Dialog
One of the ultimate goals of natural language processing (NLP) systems is understanding the meaning of what is being transmitted, irrespective of the medium (e.g., written versus ...
Eric N. Forsythand, Craig H. Martell
ICPPW
2006
IEEE
15 years 4 months ago
Embedded Knowledge-Based Speech Detectors for Real-Time Recognition Tasks
Speech recognition has become common in many application domains, from dictation systems for professional practices to vocal user interfaces for people with disabilities or hands-...
Sabato Marco Siniscalchi, Fulvio Gennaro, Salvator...
PDP
2005
IEEE
15 years 3 months ago
Memory Bandwidth Aware Scheduling for SMP Cluster Nodes
Clusters of SMPs are becoming increasingly common. However, the shared memory design of SMPs and the consequential contention between system processors for access to main memory c...
Evangelos Koukis, Nectarios Koziris
« Prev « First page 1250 / 1334 Last » Next »