Sciweavers

8468 search results - page 1314 / 1694
» The Technology of Data Stashing
Sort
View
103
Voted
NDSS
2008
IEEE
15 years 6 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 6 months ago
Policy-Based QoS-Aware Packet Scheduling for CDMA 1x Ev-DO
— CDMA 1x Ev-DO is an evolution of the CDMA2000 3G wireless standard to enable high rate packet data services up to 2.4Mbps in Rev 0, 3.1Mbps in Rev A, and 4.9Mbps in Rev B. To s...
Jinho Hwang, M. Tamer Refaei, Hyeong-Ah Choi, Jae-...
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 6 months ago
Correlation Based Rate Adaptation via Insights from Incomplete Observations in 802.11 Networks
—Rate adaptation, as a challenging issue for wireless purpose. Relatively little attention has been paid on identifying network design, has been an active research topic for year...
Xia Zhou, Jun Zhao, Guang-Hua Yang
100
Voted
IV
2007
IEEE
144views Visualization» more  IV 2007»
15 years 6 months ago
Visualizing Evolving Searches with EvoBerry
Studies show that roughly one-third of searches that are performed on the web require the user to initiate subsequent searches. Bates [1] theorized that with every search the user...
Edward Suvanaphen, Jonathan C. Roberts
76
Voted
MSS
2007
IEEE
109views Hardware» more  MSS 2007»
15 years 6 months ago
GreenStor: Application-Aided Energy-Efficient Storage
The volume of online data content has shown an un­ precedented growth in recent years. Fueling this growth are new federal regulations which warrant longer data re­ tention and ...
NagaPramod Mandagere, Jim Diehl, David Hung-Chang ...
« Prev « First page 1314 / 1694 Last » Next »