Sciweavers

2261 search results - page 145 / 453
» The problem with scalability
Sort
View
155
Voted
WEBI
2007
Springer
15 years 10 months ago
PSSF: A Novel Statistical Approach for Personalized Service-side Spam Filtering
The volume of spam e-mails has grown rapidly in the last two years resulting in increasing costs to users, network operators, and e-mail service providers (ESPs). E-mail users dem...
Khurum Nazir Junejo, Asim Karim
169
Voted
DAC
2009
ACM
15 years 8 months ago
NUDA: a non-uniform debugging architecture and non-intrusive race detection for many-core
Traditional debug methodologies are limited in their ability to provide debugging support for many-core parallel programming. Synchronization problems or bugs due to race conditio...
Chi-Neng Wen, Shu-Hsuan Chou, Tien-Fu Chen, Alan P...
ICSE
2009
IEEE-ACM
15 years 9 months ago
Synthesis of timed behavior from scenarios in the Fujaba Real-Time Tool Suite
Based on a well-defined component architecture the tool supports the synthesis of so-called real-time statecharts from timed sequence diagrams. The two step synthesis process add...
Stefan Henkler, Joel Greenyer, Martin Hirsch, Wilh...
VTC
2008
IEEE
106views Communications» more  VTC 2008»
15 years 11 months ago
Simulation-Based Performance Evaluation of Enhanced Broadcast Schemes for IEEE 802.11-Based Vehicular Networks
—Car-to-car communication (C2CC) enables cars to exchange information that can be used to, e.g., improve the drivers’ safety or comfort. Recently, WLANs based on the IEEE 802.1...
Yvonne Mertens, Matthias Wellens, Petri Mäh&o...
ICICS
2005
Springer
15 years 10 months ago
Secure Multicast Using Proxy Encryption
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” ...
Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang