Sciweavers

27336 search results - page 5320 / 5468
» Changing the subject: on the subject of subjectivity
Sort
View
107
Voted
IPPS
2010
IEEE
14 years 8 months ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
CIKM
2010
Springer
14 years 7 months ago
A late fusion approach to cross-lingual document re-ranking
The field of information retrieval still strives to develop models which allow semantic information to be integrated in the ranking process to improve performance in comparison to...
Dong Zhou, Séamus Lawless, Jinming Min, Vin...
105
Voted
CODES
2010
IEEE
14 years 7 months ago
Hardware/software optimization of error detection implementation for real-time embedded systems
This paper presents an approach to system-level optimization of error detection implementation in the context of fault-tolerant realtime distributed embedded systems used for safe...
Adrian Lifa, Petru Eles, Zebo Peng, Viacheslav Izo...
95
Voted
CORR
2010
Springer
160views Education» more  CORR 2010»
14 years 7 months ago
Routing with Mutual Information Accumulation in Wireless Networks
We investigate optimal routing and scheduling strategies for multi-hop wireless networks with rateless codes. Rateless codes allow each node of the network to accumulate mutual in...
Rahul Urgaonkar, Michael J. Neely
117
Voted
WISEC
2010
ACM
15 years 3 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
« Prev « First page 5320 / 5468 Last » Next »