Sciweavers

5882 search results - page 1148 / 1177
» networks 2010
Sort
View
MM
2010
ACM
182views Multimedia» more  MM 2010»
13 years 9 months ago
A 3d data intensive tele-immersive grid
Networked virtual environments like Second Life enable distant people to meet for leisure as well as work. But users are represented through avatars controlled by keyboards and mo...
Benjamin Petit, Thomas Dupeux, Benoit Bossavit, Jo...
DASFAA
2010
IEEE
225views Database» more  DASFAA 2010»
13 years 9 months ago
Mining Regular Patterns in Data Streams
Discovering interesting patterns from high-speed data streams is a challenging problem in data mining. Recently, the support metric-based frequent pattern mining from data stream h...
Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed,...
MOBICOM
2010
ACM
13 years 9 months ago
SMS-based web search for low-end mobile devices
Short Messaging Service (SMS) based mobile information services have become increasingly common around the world, especially in emerging regions among users with low-end mobile de...
Jay Chen, Lakshminarayanan Subramanian, Eric A. Br...
CCGRID
2010
IEEE
13 years 9 months ago
FaReS: Fair Resource Scheduling for VMM-Bypass InfiniBand Devices
In order to address the high performance I/O needs of HPC and enterprise applications, modern interconnection fabrics, such as InfiniBand and more recently, 10GigE, rely on network...
Adit Ranadive, Ada Gavrilovska, Karsten Schwan
CCS
2010
ACM
13 years 9 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
« Prev « First page 1148 / 1177 Last » Next »