Sciweavers

3022 search results - page 523 / 605
» Make Way for WayMaker
Sort
View
ASIACRYPT
2010
Springer
13 years 8 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
CIKM
2010
Springer
13 years 8 months ago
Web search solved?: all result rankings the same?
The objective of this work is to derive quantitative statements about what fraction of web search queries issued to the state-of-the-art commercial search engines lead to excellen...
Hugo Zaragoza, Berkant Barla Cambazoglu, Ricardo A...
ECAI
2010
Springer
13 years 8 months ago
From bursty patterns to bursty facts: The effectiveness of temporal text mining for news
Many document collections are by nature dynamic, evolving as the topics or events they describe change. The goal of temporal text mining is to discover bursty patterns and to ident...
Ilija Subasic, Bettina Berendt
GLOBECOM
2010
IEEE
13 years 8 months ago
A Trading System for Fairly Scheduling Fixed-Sized Delay Tolerant Jobs at a Shared Link
Scheduling of delay-tolerant jobs has been proposed as a mechanism to alleviate pressure on congested network resources. However, when multiple competing users share these resource...
Jorge Londoño, Azer Bestavros, Nikolaos Lao...
ICCAD
2010
IEEE
126views Hardware» more  ICCAD 2010»
13 years 8 months ago
Characterizing the lifetime reliability of manycore processors with core-level redundancy
With aggressive technology scaling, integrated circuits suffer from everincreasing wearout effects and their lifetime reliability has become a serious concern for the industry. Fo...
Lin Huang, Qiang Xu