Sciweavers

13214 search results - page 2550 / 2643
» Pseudorandomness for network algorithms
Sort
View
UIST
2009
ACM
15 years 10 months ago
Activity analysis enabling real-time video communication on mobile phones for deaf users
We describe our system called MobileASL for real-time video communication on the current U.S. mobile phone network. The goal of MobileASL is to enable Deaf people to communicate w...
Neva Cherniavsky, Jaehong Chon, Jacob O. Wobbrock,...
MICRO
2008
IEEE
113views Hardware» more  MICRO 2008»
15 years 10 months ago
From SODA to scotch: The evolution of a wireless baseband processor
With the multitude of existing and upcoming wireless standards, it is becoming increasingly difficult for hardware-only baseband processing solutions to adapt to the rapidly chan...
Mark Woh, Yuan Lin, Sangwon Seo, Scott A. Mahlke, ...
CSFW
2007
IEEE
15 years 10 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
INFOCOM
2007
IEEE
15 years 10 months ago
Lexicographic Fairness in WDM Optical Cross-Connects
— We consider fair allocation of sessions at the outputs of optical cross-connects employing wavelength division multiplexing (WDM). Each session consists of traffic on one or m...
Satya Ranjan Mohanty, Laxmi N. Bhuyan
ISCA
2007
IEEE
196views Hardware» more  ISCA 2007»
15 years 10 months ago
Anton, a special-purpose machine for molecular dynamics simulation
The ability to perform long, accurate molecular dynamics (MD) simulations involving proteins and other biological macromolecules could in principle provide answers to some of the ...
David E. Shaw, Martin M. Deneroff, Ron O. Dror, Je...
« Prev « First page 2550 / 2643 Last » Next »