Sciweavers

INFOCOM
2010
IEEE
13 years 2 months ago
Energy Efficient Algorithms for the RFID Estimation Problem
RFID has been gaining popularity for inventory control, object tracking, and supply chain management in warehouses, retail stores, hospitals, etc. Periodically and automatically es...
Tao Li, Samuel Wu, Shigang Chen, Mark Yang
CCS
2010
ACM
13 years 2 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
CIIT
2004
13 years 5 months ago
Transliterated arabic name search
We address name search for transliterated Arabic given names. In previous work, we addressed similar problems with English and Arabic surnames. In each previous case, we used a va...
David Holmes, Samsum Kashfi, Syed Uzair Aqeel
GPCE
2009
Springer
13 years 9 months ago
Safe composition of non-monotonic features
Programs can be composed from features. We want to verify automatically that all legal combinations of features can be composed safely without errors. Prior work on this problem a...
Martin Kuhlemann, Don S. Batory, Christian Kä...
CHI
2009
ACM
13 years 9 months ago
Supporting content and process common ground in computer-supported teamwork
We build on our prior work with computer-supported teams performing a complex decision-making task on maps, where the distinction between content and process common ground is prop...
Gregorio Convertino, Helena M. Mentis, Mary Beth R...
VTS
2007
IEEE
105views Hardware» more  VTS 2007»
13 years 10 months ago
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
Chunsheng Liu, Yu Huang
ICC
2008
IEEE
144views Communications» more  ICC 2008»
13 years 10 months ago
Meta-Mesh Span Restoration and Increased Lightpath Routing in Sparse Network Topologies
— Prior work has shown that network capacity efficiency decreases significantly as a network’s topology becomes sparse. Meta-mesh restoration was proposed in prior work as a me...
John Doucette, Zhijie Shen
EUROPAR
2009
Springer
13 years 11 months ago
Scheduling Recurrent Precedence-Constrained Task Graphs on a Symmetric Shared-Memory Multiprocessor
Abstract. We consider approaches that allow task migration for scheduling recurrent directed-acyclic-graph (DAG) tasks on symmetric, shared-memory multiprocessors (SMPs) in order t...
UmaMaheswari C. Devi