Sciweavers

2563 search results - page 486 / 513
» Performance Evaluation of Distributed Computing over Heterog...
Sort
View
INFOCOM
2012
IEEE
11 years 11 months ago
Socialize spontaneously with mobile applications
—With the proliferation of mobile devices in both smartphone and tablet form factors, it is intuitive and natural for users to socially interact with their collaborators or compe...
Zimu Liu, Yuan Feng, Baochun Li
BMCBI
2010
112views more  BMCBI 2010»
13 years 9 months ago
Orientation-dependent backbone-only residue pair scoring functions for fixed backbone protein design
Background: Empirical scoring functions have proven useful in protein structure modeling. Most such scoring functions depend on protein side chain conformations. However, backbone...
Andrew J. Bordner
HPCA
2006
IEEE
14 years 9 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
COR
2007
81views more  COR 2007»
13 years 9 months ago
Job scheduling methods for reducing waiting time variance
Minimizing Waiting Time Variance (WTV) is a job scheduling problem where we schedule a batch of n jobs, for servicing on a single resource, in such a way that the variance of thei...
Nong Ye, Xueping Li, Toni Farley, Xiaoyun Xu
NDSS
2008
IEEE
14 years 3 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters