Sciweavers

955 search results - page 157 / 191
» An Evaluation of Current High-Performance Networks
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
IJPRAI
2000
135views more  IJPRAI 2000»
13 years 7 months ago
Towards Unrestricted Lip Reading
Lip reading provides useful information in speech perception and language understanding, especially when the auditory speech is degraded. However, many current automatic lip readi...
Uwe Meier, Rainer Stiefelhagen, Jie Yang, Alex Wai...
GIS
2007
ACM
14 years 8 months ago
Evacuation route planning: scalable heuristics
Given a transportation network, a vulnerable population, and a set of destinations, evacuation route planning identifies routes to minimize the time to evacuate the vulnerable pop...
Sangho Kim, Betsy George, Shashi Shekhar
SIGMETRICS
2004
ACM
108views Hardware» more  SIGMETRICS 2004»
14 years 25 days ago
Uncooperative congestion control
—Traditionally uncooperative rate control schemes have implied open loop protocols such as UDP, CBR. In this paper we show that closed loop uncooperative rate control schemes als...
Kartikeya Chandrayana, Shivkumar Kalyanaraman
CONEXT
2008
ACM
13 years 9 months ago
Opportunistic use of client repeaters to improve performance of WLANs
Currently deployed IEEE 802.11 WLANs (Wi-Fi networks) share access point (AP) bandwidth on a per-packet basis. However, the various stations communicating with the AP often have d...
Paramvir Bahl, Ranveer Chandra, Patrick P. C. Lee,...