Sciweavers

4137 search results - page 743 / 828
» On the number of matchings of a tree
Sort
View
ICITA
2005
IEEE
14 years 1 months ago
A Web Redirection Service for Variant Chinese Domain Name Resolution
Many efforts in past years have been made to lower the linguistic barriers for non-native English speakers to access the Internet. IDNA [2] focuses on access to Internationalized ...
Jeng-Wei Lin, Li-Ming Tseng, Jan-Ming Ho, Feipei L...
LCN
2005
IEEE
14 years 1 months ago
Differentiation of Downlink 802.11e Traffic in the Virtual Collision Handler
— A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA...
Paal Engelstad, Olav N. Østerbø
MM
2005
ACM
215views Multimedia» more  MM 2005»
14 years 1 months ago
OpenVIDIA: parallel GPU computer vision
Graphics and vision are approximate inverses of each other: ordinarily Graphics Processing Units (GPUs) are used to convert “numbers into pictures” (i.e. computer graphics). I...
James Fung, Steve Mann
MSWIM
2005
ACM
14 years 1 months ago
An analytical model of the virtual collision handler of 802.11e
A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA pr...
Paal E. Engelstad, Olav N. Østerbø
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
14 years 1 months ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters