Sciweavers

74 search results - page 14 / 15
» Comparing two pairing-based aggregate signature schemes
Sort
View
HPDC
2006
IEEE
13 years 11 months ago
Path Grammar Guided Trace Compression and Trace Approximation
Trace-driven simulation is an important technique used in the evaluation of computer architecture innovations. However using it for studying parallel computers and applications is...
Xiaofeng Gao, Allan Snavely, Larry Carter
NSDI
2008
13 years 8 months ago
Harnessing Exposed Terminals in Wireless Networks
This paper presents the design, implementation, and experimental evaluation of CMAP (Conflict Maps), a system that increases the number of successful concurrent transmissions in a...
Mythili Vutukuru, Kyle Jamieson, Hari Balakrishnan
KDD
2012
ACM
181views Data Mining» more  KDD 2012»
11 years 8 months ago
On "one of the few" objects
Objects with multiple numeric attributes can be compared within any “subspace” (subset of attributes). In applications such as computational journalism, users are interested i...
You Wu, Pankaj K. Agarwal, Chengkai Li, Jun Yang 0...
GLOBECOM
2006
IEEE
13 years 11 months ago
Logical Topology Design and Interface Assignment for Multi-Channel Wireless Mesh Networks
Abstract— A multi-channel wireless mesh network (MCWMN) consists of a number of stationary wireless routers, where each router is equipped with multiple network interface cards (...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong
ICDCS
2012
IEEE
11 years 8 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...