Sciweavers

2414 search results - page 462 / 483
» Computing Normal Subgroups
Sort
View
MM
2004
ACM
155views Multimedia» more  MM 2004»
14 years 29 days ago
Disruption-tolerant content-aware video streaming
Communication between a pair of nodes in the network may get disrupted due to failures of links/nodes resulting in zero effective bandwidth between them during the recovery perio...
Tiecheng Liu, Srihari Nelakuditi
PLDI
2004
ACM
14 years 29 days ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
SIGIR
2004
ACM
14 years 29 days ago
On scaling latent semantic indexing for large peer-to-peer systems
The exponential growth of data demands scalable infrastructures capable of indexing and searching rich content such as text, music, and images. A promising direction is to combine...
Chunqiang Tang, Sandhya Dwarkadas, Zhichen Xu
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 25 days ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
ISWC
2003
IEEE
14 years 24 days ago
A Wearable Sense of Balance Monitoring System towards Daily Health Care Monitoring
We implemented a wearable system for detecting accelerations of the user's head while standing still for the purpose of developing a daily health care application. A 2axis ac...
Soichiro Matsushita, Toshihiko Oba, Kazuoki Otsuki...