Sciweavers

24529 search results - page 4814 / 4906
» Computing on Authenticated Data
Sort
View
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
14 years 2 months ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
14 years 2 months ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong
MHCI
2009
Springer
14 years 2 months ago
Glancephone: an exploration of human expression
In this paper, we describe the design and ethnographic study of a phone developed so as to allow people to glance at each other, rather than simply message or voice call. Glanceph...
Richard H. R. Harper, Stuart Taylor
CCS
2001
ACM
14 years 2 months ago
Secure Open Systems for Protecting Privacy and Digital Services
This paper describes and analyzes a system architecture that enables consumers to access services and content from multiple providers without jeopardizing the privacy interests of...
David W. Kravitz, Kim-Ee Yeoh, Nicol So
ICALP
2001
Springer
14 years 2 months ago
Permutation Editing and Matching via Embeddings
Abstract. If the genetic maps of two species are modelled as permutations of (homologous) genes, the number of chromosomal rearrangements in the form of deletions, block moves, inv...
Graham Cormode, S. Muthukrishnan, Süleyman Ce...
« Prev « First page 4814 / 4906 Last » Next »