Sciweavers

12438 search results - page 2190 / 2488
» The Magic of a Number System
Sort
View
NAACL
2010
15 years 2 months ago
Detecting Emails Containing Requests for Action
Automatically finding email messages that contain requests for action can provide valuable assistance to users who otherwise struggle to give appropriate attention to the actionab...
Andrew Lampert, Robert Dale, Cécile Paris
NOCS
2010
IEEE
15 years 2 months ago
Physical vs. Virtual Express Topologies with Low-Swing Links for Future Many-Core NoCs
The number of cores present on-chip is increasing rapidly. The on-chip network that connects these cores needs to scale efficiently. The topology of on-chip networks is an importan...
Chia-Hsin Owen Chen, Niket Agarwal, Tushar Krishna...
PIMRC
2010
IEEE
15 years 2 months ago
Connectivity in wireless networks with dynamic key compromise and recovery
Abstract--This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity i...
Satashu Goel, Aylin Yener
QOSA
2010
Springer
15 years 2 months ago
Using QoS-Contracts to Drive Architecture-Centric Self-adaptation
Self-adaptation is now a promising approach to maximize the satisfaction of requirements under changing environmental conditions. One of the key challenges for such self-adaptive s...
Franck Chauvel, Hui Song, Xiangping Chen, Gang Hua...
SDMW
2010
Springer
15 years 2 months ago
Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little ...
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, P...
« Prev « First page 2190 / 2488 Last » Next »