Sciweavers

1192 search results - page 92 / 239
» Computing Weakest Readings
Sort
View
EUC
2005
Springer
15 years 9 months ago
PULSE: A MAC Protocol for RFID Networks
1 The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may ...
Shailesh M. Birari, Sridhar Iyer
99
Voted
ICAT
2003
IEEE
15 years 8 months ago
Texture Overlay onto Deformable Surface Using Geometric Transformation
We propose a system that overlays textures onto the arbitrary deformable surface of an object in real time using HMD. In this system, we select a book as the object and documents ...
Mototsugu Emori, Hideo Saito
107
Voted
MSS
1999
IEEE
85views Hardware» more  MSS 1999»
15 years 7 months ago
Tape Group Parity Protection
We propose a new method of ensuring the redundant storage of information on tertiary storage, especially tape storage. Conventional methods for redundant data storage on tape incl...
Theodore Johnson, Sunil Prabhakar
CRYPTO
2008
Springer
132views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
Public-Key Locally-Decodable Codes
In this paper we introduce the notion of a Public-Key Encryption Scheme that is also a Locally-Decodable Error-Correcting Code (PKLDC). In particular, we allow any polynomialtime ...
Brett Hemenway, Rafail Ostrovsky
120
Voted
MASCOTS
2001
15 years 4 months ago
PROFS-Performance-Oriented Data Reorganization for Log-Structured File System on Multi-Zone Disks
I/O is a major performance bottleneck in modern computer systems. Modern disks use the Zone-Bit-Recording (ZBR) technology to increase the capacity. A direct consequence of ZBR is...
Jun Wang, Yiming Hu