Sciweavers

2699 search results - page 387 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
OOPSLA
2010
Springer
13 years 8 months ago
Back to the futures: incremental parallelization of existing sequential runtime systems
Many language implementations, particularly for high-level and scripting languages, are based on carefully honed runtime systems that have an internally sequential execution model...
James Swaine, Kevin Tew, Peter A. Dinda, Robert Br...
SPEECH
2011
13 years 5 months ago
A multistage approach to blind separation of convolutive speech mixtures
We propose a novel algorithm for the separation of convolutive speech mixtures using two-microphone recordings, based on the combination of independent component analysis (ICA) an...
Tariqullah Jan, Wenwu Wang, DeLiang Wang
ECOOP
2012
Springer
12 years 19 days ago
Enhancing JavaScript with Transactions
Abstract. Transcript is a system that enhances JavaScript with support for transactions. Hosting Web applications can use transactions to demarcate regions that contain untrusted g...
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
ESAS
2004
Springer
14 years 3 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
ISCC
2006
IEEE
112views Communications» more  ISCC 2006»
14 years 4 months ago
The Precision and Energetic Cost of Snapshot Estimates in Wireless Sensor Networks
— Even for a specific application, the design space of wireless sensor networks is enormous, and traditional disciplinary boundaries are disappearing in the search for efficien...
Paul G. Flikkema