Sciweavers

605 search results - page 105 / 121
» A strategy for efficiently verifying requirements
Sort
View
AES
2005
Springer
137views Cryptology» more  AES 2005»
13 years 9 months ago
Design of a multimedia processor based on metrics computation
Media-processing applications, such as signal processing, 2D and 3D graphics rendering, and image compression, are the dominant workloads in many embedded systems today. The real-...
Nader Ben Amor, Yannick Le Moullec, Jean-Philippe ...
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
14 years 10 months ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...
ICIP
2009
IEEE
14 years 10 months ago
Scaling Peer-to-peer Video-on-demand Systems Using Helpers
The throughput of Peer-to-Peer (P2P) Video-on-Demand (VoD) systems is typically capped by the users' aggregate upload bandwidth [1]. The drastic increase in the popularity of...
KDD
2004
ACM
112views Data Mining» more  KDD 2004»
14 years 9 months ago
A rank sum test method for informative gene discovery
Finding informative genes from microarray data is an important research problem in bioinformatics research and applications. Most of the existing methods rank features according t...
Lin Deng, Jian Pei, Jinwen Ma, Dik Lun Lee
VLDB
2008
ACM
103views Database» more  VLDB 2008»
14 years 9 months ago
The optimal sequenced route query
Several variations of nearest neighbor (NN) query have been investigated by the database community. However, realworld applications often result in the formulation of new variatio...
Mehdi Sharifzadeh, Mohammad R. Kolahdouzan, Cyrus ...