Sciweavers

1194 search results - page 69 / 239
» Adaptive Website Design Using Caching Algorithms
Sort
View
NSDI
2008
13 years 11 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
CASCON
2004
129views Education» more  CASCON 2004»
13 years 10 months ago
Practical language-independent detection of near-miss clones
Previous research shows that most software systems contain significant amounts of duplicated, or cloned, code. Some clones are exact duplicates of each other, while others differ ...
James R. Cordy, Thomas R. Dean, Nikita Synytskyy
COMCOM
2008
131views more  COMCOM 2008»
13 years 9 months ago
CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast
In this paper, we present Collaborative Opportunistic Recovery Algorithm (CORA) designed for multicast multimedia applications with low loss as well as latency constraints in ad h...
Yunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Pa...
CIIA
2009
13 years 10 months ago
Appling A Discrete Particle Swarm Optimization Algorithm to Database Vertical Partition
Vertical partition is an important technique in database design used to enhance performance in database systems. Vertical fragmentation is a combinatorial optimization problem that...
Bilal Benmessahel, Mohamed Touahria
DATE
2010
IEEE
121views Hardware» more  DATE 2010»
14 years 2 months ago
Properties of and improvements to time-domain dynamic thermal analysis algorithms
—Temperature has a strong influence on integrated circuit (IC) performance, power consumption, and reliability. However, accurate thermal analysis can impose high computation co...
Xi Chen, Robert P. Dick, Li Shang