Sciweavers

Share
INFOCOM
2010
IEEE
8 years 1 months ago
Energy Efficient Algorithms for the RFID Estimation Problem
RFID has been gaining popularity for inventory control, object tracking, and supply chain management in warehouses, retail stores, hospitals, etc. Periodically and automatically es...
Tao Li, Samuel Wu, Shigang Chen, Mark Yang
CCS
2010
ACM
8 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
CIIT
2004
8 years 4 months ago
Transliterated arabic name search
We address name search for transliterated Arabic given names. In previous work, we addressed similar problems with English and Arabic surnames. In each previous case, we used a va...
David Holmes, Samsum Kashfi, Syed Uzair Aqeel
GPCE
2009
Springer
8 years 8 months ago
Safe composition of non-monotonic features
Programs can be composed from features. We want to verify automatically that all legal combinations of features can be composed safely without errors. Prior work on this problem a...
Martin Kuhlemann, Don S. Batory, Christian Kä...
CHI
2009
ACM
8 years 8 months ago
Supporting content and process common ground in computer-supported teamwork
We build on our prior work with computer-supported teams performing a complex decision-making task on maps, where the distinction between content and process common ground is prop...
Gregorio Convertino, Helena M. Mentis, Mary Beth R...
VTS
2007
IEEE
105views Hardware» more  VTS 2007»
8 years 9 months ago
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
Chunsheng Liu, Yu Huang
ICC
2008
IEEE
144views Communications» more  ICC 2008»
8 years 9 months ago
Meta-Mesh Span Restoration and Increased Lightpath Routing in Sparse Network Topologies
— Prior work has shown that network capacity efficiency decreases significantly as a network’s topology becomes sparse. Meta-mesh restoration was proposed in prior work as a me...
John Doucette, Zhijie Shen
EUROPAR
2009
Springer
8 years 10 months ago
Scheduling Recurrent Precedence-Constrained Task Graphs on a Symmetric Shared-Memory Multiprocessor
Abstract. We consider approaches that allow task migration for scheduling recurrent directed-acyclic-graph (DAG) tasks on symmetric, shared-memory multiprocessors (SMPs) in order t...
UmaMaheswari C. Devi
books