Sciweavers

4438 search results - page 849 / 888
» On the Distribution of Keys by Hashing
Sort
View
SIGMETRICS
1997
ACM
112views Hardware» more  SIGMETRICS 1997»
14 years 2 months ago
Group-Guaranteed Channel Capacity in Multimedia Storage Servers
One of the open questions in the design of multimedia storage servers is in what order to serve incoming requests. Given the capability provided by the disk layout and scheduling ...
Athanassios Tsiolis, Mary K. Vernon
SIGSOFT
1995
ACM
14 years 2 months ago
Precise Interprocedural Chopping
The notion of a program slice, originally introduced by Mark Weiser, is a fundamental operation for addressing many software-engineering problems, including program understanding,...
Thomas W. Reps, Genevieve Rosay
SIGCOMM
1991
ACM
14 years 2 months ago
IP-Based Protocols for Mobile Internetworking
We consider the problem of providing network access to hosts whose physical location changes with time. Such hosts cannot depend on traditional forms of network connectivity and r...
John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.
ECCV
2010
Springer
14 years 1 months ago
Depth-Encoded Hough Voting for joint object detection and shape recovery
Detecting objects, estimating their pose and recovering 3D shape information is a critical problem in many vision and robotics applications. This paper addresses the above needs by...
MOBISYS
2010
ACM
14 years 1 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...