Sciweavers

577 search results - page 101 / 116
» Budget Feasible Mechanisms
Sort
View
TMC
2012
13 years 2 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
TMC
2012
13 years 2 months ago
SenseLess: A Database-Driven White Spaces Network
The FCC ruling on Nov 4th, 2008 on white spaces has opened up the possibility of wireless network deployments over white spaces, i.e., vacant UHF TV channels. A key requirement fo...
Rohan Murty, Ranveer Chandra, Thomas Moscibroda, P...
WWW
2002
ACM
16 years 13 days ago
OCTOPUS: aggressive search of multi-modality data using multifaceted knowledge base
An important trend in Web information processing is the support of multimedia retrieval. However, the most prevailing paradigm for multimedia retrieval, content-based retrieval (C...
Jun Yang 0003, Qing Li, Yueting Zhuang
POPL
2004
ACM
16 years 2 days ago
Symbolic transfer function-based approaches to certified compilation
We present a framework for the certification of compilation and of compiled programs. Our approach uses a symbolic transfer functions-based representation of programs, so as to ch...
Xavier Rival
OSDI
2002
ACM
16 years 1 days ago
Resource Overbooking and Application Profiling in Shared Hosting Platforms
In this paper, we present techniques for provisioning CPU and network resources in shared hosting platforms running potentially antagonistic third-party applications. The primary ...
Bhuvan Urgaonkar, Prashant J. Shenoy, Timothy Rosc...