Sciweavers

1290 search results - page 238 / 258
» Data Dependence Testing in Practice
Sort
View
DIGRA
2005
Springer
14 years 1 months ago
Contexts, pleasures and preferences: girls playing computer games
In this paper, issues of girls and their gaming preferences are explored through observations of computer games sessions at an all-girl state school. What emerged is that preferen...
Diane Carr
SAINT
2003
IEEE
14 years 26 days ago
A Generalized Target-Driven Cache Replacement Policy for Mobile Environments
Caching frequently accessed data items on the client side is an effective technique to improve the system performance in wireless networks. Due to cache size limitations, cache re...
Liangzhong Yin, Guohong Cao, Ying Cai
COMPGEOM
2003
ACM
14 years 26 days ago
Cost-driven octree construction schemes: an experimental study
Given a scene consisting of objects, ray shooting queries answer with the first object encountered by a given ray, and are used in ray tracing and radiosity for rendering photo-r...
Boris Aronov, Hervé Brönnimann, Allen ...
SENSYS
2003
ACM
14 years 26 days ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
EUROCRYPT
2010
Springer
14 years 12 days ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...