Sciweavers

2746 search results - page 179 / 550
» Application performance on the Direct Access File System
Sort
View
NDSS
2005
IEEE
14 years 2 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
PERVASIVE
2010
Springer
14 years 4 months ago
No-Look Notes: Accessible Eyes-Free Multi-touch Text Entry
Mobile devices with multi-touch capabilities are becoming increasingly common, largely due to the success of the Apple iPhone and iPod Touch. While there have been some advances in...
Matthew N. Bonner, Jeremy T. Brudvik, Gregory D. A...
APN
2009
Springer
14 years 13 days ago
The Access/CPN Framework: A Tool for Interacting with the CPN Tools Simulator
Abstract. Coloured Petri nets (CP-nets or CPNs) is a widely used formalism for describing concurrent systems. CPN Tools provides a mature environment for constructing, simulating, ...
Michael Westergaard, Lars Michael Kristensen
MOBICOM
2004
ACM
14 years 2 months ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the e...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...
ET
2010
83views more  ET 2010»
13 years 7 months ago
Experience with Widening Based Equivalence Checking in Realistic Multimedia Systems
—Designers often apply manual or semi-automatic loop and data transformations on array and loop intensive programs to improve performance. For the class of static affine program...
Sven Verdoolaege, Martin Palkovic, Maurice Bruynoo...