Sciweavers

24188 search results - page 4719 / 4838
» Computing on Encrypted Data
Sort
View
P2P
2005
IEEE
189views Communications» more  P2P 2005»
15 years 10 months ago
Proximity Neighbor Selection for a DHT in Wireless Multi-Hop Networks
A mobile ad hoc network (MANET) is a multi-hop wireless network having no infrastructure. Thus, the mobile nodes have to perform basic control tasks, such as routing, and higher-l...
Curt Cramer, Thomas Fuhrmann
SBACPAD
2005
IEEE
176views Hardware» more  SBACPAD 2005»
15 years 10 months ago
Analyzing and Improving Clustering Based Sampling for Microprocessor Simulation
The time required to simulate a complete benchmark program using the cycle-accurate model of a microprocessor can be prohibitively high. One of the proposed methodologies, represe...
Yue Luo, Ajay Joshi, Aashish Phansalkar, Lizy Kuri...
VISUALIZATION
2005
IEEE
15 years 10 months ago
Exploring 2D Tensor Fields Using Stress Nets
In this article we describe stress nets, a technique for exploring 2D tensor fields. Our method allows a user to examine simultaneously the tensors' eigenvectors (both major ...
Andrew Wilson, Rebecca M. Brannon
VL
2005
IEEE
113views Visual Languages» more  VL 2005»
15 years 10 months ago
Estimating the Numbers of End Users and End User Programmers
In 1995, Boehm predicted that by 2005, there would be “55 million performers” of “end user programming” in the United States. The original context and method which generat...
Christopher Scaffidi, Mary Shaw, Brad A. Myers
ACMICEC
2005
ACM
175views ECommerce» more  ACMICEC 2005»
15 years 10 months ago
A theoretic discussion of tourism e-commerce
This paper presents the model of e-market structure and process analysis of tourism e-commerce. First the tourism e-commerce status quo is given clearly; secondly e-commerce and i...
Si-qing Liu
« Prev « First page 4719 / 4838 Last » Next »