Sciweavers

2880 search results - page 518 / 576
» Types are calling conventions
Sort
View
133
Voted
ICNP
2007
IEEE
15 years 10 months ago
PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs
— While the 802.11 power saving mode (PSM) and its enhancements can reduce power consumption by putting the wireless network interface (WNI) into sleep as much as possible, they ...
Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang
139
Voted
IV
2007
IEEE
144views Visualization» more  IV 2007»
15 years 10 months ago
Visualizing Evolving Searches with EvoBerry
Studies show that roughly one-third of searches that are performed on the web require the user to initiate subsequent searches. Bates [1] theorized that with every search the user...
Edward Suvanaphen, Jonathan C. Roberts
137
Voted
VTC
2007
IEEE
15 years 10 months ago
Performance Modelling and Analysis of the Sleep-Mode in IEEE802.16e WMAN
In this study, we analyze the sleep-mode operation for power management of a mobile station in the IEEE802.16e Wireless Metropolitan Access Network. For the analysis we use the M/...
Yunju Park, Gang Uk Hwang
126
Voted
CIKM
2007
Springer
15 years 9 months ago
A dual-view approach to interactive network visualization
Visualizing network data, from tree structures to arbitrarily connected graphs, is a difficult problem in information visualization. A large part of the problem is that in network...
Galileo Namata, Brian Staats, Lise Getoor, Ben Shn...
131
Voted
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
15 years 9 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang