Sciweavers

18374 search results - page 3648 / 3675
» Applications for data hiding
Sort
View
JUCS
2010
124views more  JUCS 2010»
13 years 6 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
13 years 6 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
ORGSCI
2010
92views more  ORGSCI 2010»
13 years 6 months ago
Are Technology-Intensive Industries More Dynamically Competitive? No and Yes
A growing body of research in management and related public policy fields concludes that the 1980s and 1990s saw greater dynamic competition throughout technology−intensive (“...
Paul M. Vaaler, Gerry McNamara
OTM
2010
Springer
13 years 6 months ago
CoMaP: A Cooperative Overlay-Based Mashup Platform
Recently, mashups have emerged as an important class of Web 2.0 collaborative applications. Mashups can be conceived as personalized Web services which aggregate and manipulate dat...
Osama Al-Haj Hassan, Lakshmish Ramaswamy, John A. ...
PC
2010
196views Management» more  PC 2010»
13 years 6 months ago
Solving path problems on the GPU
We consider the computation of shortest paths on Graphic Processing Units (GPUs). The blocked recursive elimination strategy we use is applicable to a class of algorithms (such as...
Aydin Buluç, John R. Gilbert, Ceren Budak
« Prev « First page 3648 / 3675 Last » Next »