Sciweavers

15660 search results - page 3131 / 3132
» The Unbalance of Set Systems
Sort
View
DOCENG
2011
ACM
12 years 9 months ago
Contributions to the study of SMS spam filtering: new collection and results
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
Tiago A. Almeida, José María G&oacut...
IACR
2011
89views more  IACR 2011»
12 years 9 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
ICC
2011
IEEE
215views Communications» more  ICC 2011»
12 years 9 months ago
Optimal Packet Scheduling in a Broadcast Channel with an Energy Harvesting Transmitter
—In this paper, we investigate the transmission completion time minimization problem in a two-user additive white Gaussian noise (AWGN) broadcast channel, where the transmitter i...
Jing Yang, Omur Ozel, Sennur Ulukus
NOCS
2007
IEEE
14 years 3 months ago
The Power of Priority: NoC Based Distributed Cache Coherency
The paper introduces Network-on-Chip (NoC) design methodology and low cost mechanisms for supporting efficient cache access and cache coherency in future high-performance Chip Mul...
Evgeny Bolotin, Zvika Guz, Israel Cidon, Ran Ginos...
PLDI
2005
ACM
14 years 3 months ago
Pin: building customized program analysis tools with dynamic instrumentation
Robust and powerful software instrumentation tools are essential for program analysis tasks such as profiling, performance evaluation, and bug detection. To meet this need, we ha...
Chi-Keung Luk, Robert S. Cohn, Robert Muth, Harish...
« Prev « First page 3131 / 3132 Last » Next »