Sciweavers

236 search results - page 18 / 48
» How Can Intra Correlation Be Exploited Better
Sort
View
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
11 years 9 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
ICC
2007
IEEE
148views Communications» more  ICC 2007»
14 years 1 months ago
HSDPA Performance in Live Networks
—The first HSDPA (High-Speed Downlink Packet Access) networks have been recently deployed for operational use. We evaluate and compare live HSDPA operational network performance ...
Marko Jurvansuu, Jarmo Prokkola, Mikko Hanski, Pek...
UM
2005
Springer
14 years 26 days ago
Motion-Based Adaptation of Information Services for Mobile Users
Adaptive information systems typically exploit knowledge about the user’s interests, preferences, goals etc. to determine what should be presented to the user and how this presen...
Mathias Bauer, Matthieu Deru
ICIP
2007
IEEE
14 years 1 months ago
Distributed Compression of Multi-View Images using a Geometrical Coding Approach
In this paper, we propose a distributed compression approach for multi-view images, where each camera efficiently encodes its visual information locally without requiring any col...
Nicolas Gehrig, Pier Luigi Dragotti
ARCS
2004
Springer
14 years 24 days ago
Latent Semantic Indexing in Peer-to-Peer Networks
Searching in decentralized peer-to-peer networks is a challenging problem. In common applications such as Gnutella, searching is performed by randomly forwarding queries to all pee...
Xuezheng Liu, Ming Chen, Guangwen Yang