Sciweavers

9124 search results - page 66 / 1825
» Requirements-Based Design Evaluation
Sort
View
DRM
2007
Springer
15 years 6 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
113
Voted
TPDS
2010
155views more  TPDS 2010»
14 years 11 months ago
Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation
—Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. However, all these s...
Jing Zhao, Ping Zhang, Guohong Cao, Chita R. Das
206
Voted
ICDE
2009
IEEE
285views Database» more  ICDE 2009»
16 years 2 months ago
Design and Evaluation of the iMed Intelligent Medical Search Engine
-- Searching for medical information on the Web is popular and important. However, medical search has its own unique requirements that are poorly handled by existing medical Web se...
Gang Luo
109
Voted
SECON
2008
IEEE
15 years 7 months ago
A Multi-AP Architecture for High-Density WLANs: Protocol Design and Experimental Evaluation
—Fast proliferation of IEEE 802.11 wireless devices has led to the emergence of High-Density (HD) Wireless Local Area Networks (WLANs), where it is challenging to improve the thr...
Yanfeng Zhu, Zhisheng Niu, Qian Zhang, Bo Tan, Zhi...
EUROPAR
2000
Springer
15 years 4 months ago
Design and Evaluation of a Compiler-Directed Collective I/O Technique
Abstract. Current approaches to parallel I/O demand extensive user effort to obtain acceptable performance. This is in part due to difficulties in understanding the characteristics...
Gokhan Memik, Mahmut T. Kandemir, Alok N. Choudhar...