Sciweavers

3104 search results - page 569 / 621
» Competence-Based EE-Learning: (How) Can We Implement It
Sort
View
FC
2009
Springer
150views Cryptology» more  FC 2009»
15 years 11 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
149
Voted
IWMM
2009
Springer
164views Hardware» more  IWMM 2009»
15 years 11 months ago
Live heap space analysis for languages with garbage collection
The peak heap consumption of a program is the maximum size of the live data on the heap during the execution of the program, i.e., the minimum amount of heap space needed to run t...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...
MHCI
2009
Springer
15 years 11 months ago
Designing phrase builder: a mobile real-time query expansion interface
As users enter web queries, real-time query expansion (RTQE) interfaces offer suggestions based on an index garnered from query logs. In selecting a suggestion, users can potentia...
Tim Paek, Bongshin Lee, Bo Thiesson
CGO
2008
IEEE
15 years 11 months ago
Latency-tolerant software pipelining in a production compiler
In this paper we investigate the benefit of scheduling non-critical loads for a higher latency during software pipelining. "Noncritical" denotes those loads that have s...
Sebastian Winkel, Rakesh Krishnaiyer, Robyn Sampso...
IPPS
2008
IEEE
15 years 11 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli