This paper solves the open problem of extracting the maximal number of iterations from a loop that can be executed in parallel on chip multiprocessors. Our algorithm solves it opt...
Duo Liu, Zili Shao, Meng Wang, Minyi Guo, Jingling...
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
In the recent years, photo context metadata (e.g., date, GPS coordinates) have been proved to be useful in the management of personal photos. However, these metadata are still poo...
—E-limited (or K-limited) scheduling is attractive because its performance is close to that of the exhaustive scheduling which is proven to be the optimal polling scheme for symm...