Sciweavers

1856 search results - page 204 / 372
» Phoning it in
Sort
View
ALGORITHMICA
2010
164views more  ALGORITHMICA 2010»
13 years 11 months ago
Space Efficient Algorithms for the Burrows-Wheeler Backtransformation
The Burrows-Wheeler transformation is used for effective data compression, e.g., in the well known program bzip2. Compression and decompression are done in a block-wise fashion; la...
Ulrich Lauther, Tamás Lukovszki
CCR
2008
65views more  CCR 2008»
13 years 11 months ago
The future in your pocket
There is a growing sentiment among academics in computing that a shift to multicore processors in commodity computers will demand that all programmers become parallel programmers....
Patrick Crowley
CE
2008
107views more  CE 2008»
13 years 11 months ago
The design and evaluation of a computerized adaptive test on mobile devices
The use of computerized-adaptive testing (CAT) has expanded rapidly the last years mainly due to the advancements in communication and information technology. Availability of adva...
Evangelos Triantafillou, Georgiadou Elissavet, Ana...
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 11 months ago
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
Mohsen Toorani
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 11 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi