Sciweavers

7839 search results - page 1314 / 1568
» What's there and what's not
Sort
View
INFOCOM
2009
IEEE
15 years 8 months ago
Using NEMO to Support the Global Reachability of MANET Nodes
—Mobile Ad hoc Network (MANET) routing protocols have been the focus of an accomplished research effort for many years within the networking community and now the results of this...
Ben McCarthy, Christopher Edwards, Martin Dunmore
ISCA
2009
IEEE
180views Hardware» more  ISCA 2009»
15 years 8 months ago
Decoupled DIMM: building high-bandwidth memory system using low-speed DRAM devices
The widespread use of multicore processors has dramatically increased the demands on high bandwidth and large capacity from memory systems. In a conventional DDR2/DDR3 DRAM memory...
Hongzhong Zheng, Jiang Lin, Zhao Zhang, Zhichun Zh...
ACG
2009
Springer
15 years 8 months ago
Plans, Patterns, and Move Categories Guiding a Highly Selective Search
In this paper we present our ideas for an Arimaa-playing program (also called a bot) that uses plans and pattern matching to guide a highly selective search. We restrict move gener...
Gerhard Trippen
ACML
2009
Springer
15 years 8 months ago
Context-Aware Online Commercial Intention Detection
With more and more commercial activities moving onto the Internet, people tend to purchase what they need through Internet or conduct some online research before the actual transac...
Derek Hao Hu, Dou Shen, Jian-Tao Sun, Qiang Yang, ...
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
15 years 8 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
« Prev « First page 1314 / 1568 Last » Next »