Sciweavers

859 search results - page 154 / 172
» The Changing Face of Cryptography
Sort
View
CC
2010
Springer
190views System Software» more  CC 2010»
15 years 4 months ago
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors?
On Chip Multiprocessors (CMP), it is common that multiple cores share certain levels of cache. The sharing increases the contention in cache and memory-to-chip bandwidth, further h...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Xipeng She...
INFOCOM
2009
IEEE
15 years 4 months ago
Sensor Network Navigation without Locations
—We propose a pervasive usage of the sensor network infrastructure as a cyber-physical system for navigating internal users in locations of potential danger. Our proposed applica...
Mo Li, Yunhao Liu, Jiliang Wang, Zheng Yang
91
Voted
AMMA
2009
Springer
15 years 4 months ago
Auctions with Dynamic Populations: Efficiency and Revenue Maximization
ABSTRACT: We examine an environment where goods and privately informed buyers arrive stochastically to a market. A seller in this setting faces a sequential allocation problem with...
Maher Said
IWMM
2009
Springer
166views Hardware» more  IWMM 2009»
15 years 4 months ago
Garbage collection in the next C++ standard
: © Garbage Collection in the Next C++ Standard Hans-J. Boehm, Mike Spertus HP Laboratories HPL-2009-360 C++, garbage collection C++ has traditionally relied on manual memory mana...
Hans-Juergen Boehm, Mike Spertus
DIM
2009
ACM
15 years 4 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy