Sciweavers

2392 search results - page 267 / 479
» Channel-Hopping Multiple Access
Sort
View
156
Voted
EUROCRYPT
2004
Springer
15 years 10 months ago
Projective Coordinates Leak
Denoting by P = [k]G the elliptic-curve double-and-add multiplication of a public base point G by a secret k, we show that allowing an adversary access to the projective representa...
David Naccache, Nigel P. Smart, Jacques Stern
VLDB
2004
ACM
104views Database» more  VLDB 2004»
15 years 10 months ago
Remembrance of Streams Past: Overload-Sensitive Management of Archived Streams
This paper studies Data Stream Management Systems that combine real-time data streams with historical data, and hence access incoming streams and archived data simultaneously. A s...
Sirish Chandrasekaran, Michael J. Franklin
140
Voted
DATE
2003
IEEE
127views Hardware» more  DATE 2003»
15 years 10 months ago
Exploring High Bandwidth Pipelined Cache Architecture for Scaled Technology
In this paper we propose a design technique to pipeline cache memories for high bandwidth applications. With the scaling of technology cache access latencies are multiple clock cy...
Amit Agarwal, Kaushik Roy, T. N. Vijaykumar
COOPIS
1999
IEEE
15 years 9 months ago
Using Fagin's Algorithm for Merging Ranked Results in Multimedia Middleware
A distributed multimedia information system allows users to access data of different modalities, from different data sources, ranked by various combinationsof criteria. In [6], Fa...
Edward L. Wimmers, Laura M. Haas, Mary Tork Roth, ...
157
Voted
TSMC
2002
105views more  TSMC 2002»
15 years 4 months ago
On the use of learning automata in the control of broadcast networks: a methodology
Due to its fixed assignment nature, the well-known time division multiple access (TDMA) protocol suffers from poor performance when the offered traffic is bursty. In this paper, an...
Georgios I. Papadimitriou, Mohammad S. Obaidat, An...