Sciweavers

18306 search results - page 3416 / 3662
» Algorithmics in Exponential Time
Sort
View
114
Voted
SIGMETRICS
2004
ACM
135views Hardware» more  SIGMETRICS 2004»
15 years 8 months ago
Multi-dimensional storage virtualization
Most state-of-the-art commercial storage virtualization systems focus only on one particular storage attribute, capacity. This paper describes the design, implementation and evalu...
Lan Huang, Gang Peng, Tzi-cker Chiueh
179
Voted
SIGMETRICS
2004
ACM
206views Hardware» more  SIGMETRICS 2004»
15 years 8 months ago
Performance aware tasking for environmentally powered sensor networks
The use of environmental energy is now emerging as a feasible energy source for embedded and wireless computing systems such as sensor networks where manual recharging or replacem...
Aman Kansal, Dunny Potter, Mani B. Srivastava
VRCAI
2004
ACM
15 years 8 months ago
A novel approach to extract triangle strips for iso-surfaces in volumes
The Marching Cubes (MC) algorithm is a popular approach to extract iso-surfaces from volumetric data. This approach extracts triangles from the volume data for a specific iso-valu...
Jagannathan Lakshmipathy, Wieslaw L. Nowinski, Eri...
123
Voted
CP
2004
Springer
15 years 8 months ago
Controllability of Soft Temporal Constraint Problems
In real-life temporal scenarios, uncertainty and preferences are often essential, coexisting aspects. We present a formalism where temporal constraints with both preferences and un...
Francesca Rossi, Kristen Brent Venable, Neil Yorke...
ESAS
2004
Springer
15 years 8 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
« Prev « First page 3416 / 3662 Last » Next »