Sciweavers

5523 search results - page 1094 / 1105
» Improving application performance with hardware data structu...
Sort
View
COMSWARE
2006
IEEE
13 years 11 months ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
CLUSTER
2001
IEEE
13 years 11 months ago
Semi-Continuous Transmission for Cluster-Based Video Servers
With advances in storage technology, the ability to provide client end storage for continuous media applications has become a possibility. Transmission of data in cluster based mu...
Sandy Irani, Nalini Venkatasubramanian
ESORICS
2010
Springer
13 years 8 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik
CCS
2010
ACM
13 years 7 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
BMCBI
2005
189views more  BMCBI 2005»
13 years 7 months ago
A sentence sliding window approach to extract protein annotations from biomedical articles
Background: Within the emerging field of text mining and statistical natural language processing (NLP) applied to biomedical articles, a broad variety of techniques have been deve...
Martin Krallinger, Maria Padron, Alfonso Valencia
« Prev « First page 1094 / 1105 Last » Next »