Sciweavers

154 search results - page 14 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
CASES
2004
ACM
15 years 1 months ago
Reducing energy consumption of queries in memory-resident database systems
The tremendous growth of system memories has increased the capacities and capabilities of memory-resident embedded databases, yet current embedded databases need to be tuned in or...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
MOBILITY
2009
ACM
15 years 4 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...
ISSTA
2009
ACM
15 years 4 months ago
Specifying the worst case: orthogonal modeling of hardware errors
During testing, the execution of valid cases is only one part of the task. Checking the behavior in boundary situations and in the presence of errors is an equally important subje...
Jewgenij Botaschanjan, Benjamin Hummel
AIED
2005
Springer
15 years 3 months ago
Collaboration and Cognitive Tutoring: Integration, Empirical Results, and Future Directions
In this paper, we describe progress we have made toward providing cognitive tutoring to students within a collaborative software environment. First, we have integrated a collaborat...
Andreas Harrer, Bruce M. McLaren, Erin Walker, Lar...
OTM
2010
Springer
14 years 7 months ago
Evaluation of Metaverse Server in a Widely-Distributed Environment
"Metaverse" is a new service connecting to three dimensional virtual space constructed as electronic data through the Internet, which is expected to be spread in the futu...
Mayu Matsubara, Masato Oguchi