Sciweavers

9325 search results - page 1713 / 1865
» The decentralized implementability problem
Sort
View
109
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
SMS-based contextual web search
SMS-based web search is different from traditional web search in that the final response to a search query is limited to a very small number of bytes (typically 1-2 SMS messages...
Jay Chen, Brendan Linn, Lakshminarayanan Subramani...
147
Voted
VRST
2009
ACM
15 years 10 months ago
The virtual magic lantern: an interaction metaphor for enhanced medical data inspection
In Volume Rendering, it is difficult to simultaneously visualize interior and exterior structures. Several approaches have been developed to solve this problem, such as cut-away ...
Eva Monclús, José Díaz, Isabe...
132
Voted
CLUSTER
2008
IEEE
15 years 10 months ago
A trace-driven emulation framework to predict scalability of large clusters in presence of OS Jitter
—Various studies have pointed out the debilitating effects of OS Jitter on the performance of parallel applications on large clusters such as the ASCI Purple and the Mare Nostrum...
Pradipta De, Ravi Kothari, Vijay Mann
120
Voted
CSFW
2008
IEEE
15 years 10 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
148
Voted
CSFW
2008
IEEE
15 years 10 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
« Prev « First page 1713 / 1865 Last » Next »