Sciweavers

24529 search results - page 4511 / 4906
» Computing on Authenticated Data
Sort
View
150
Voted
CAL
2006
15 years 5 months ago
A Case for Compressing Traces with BDDs
Instruction-level traces are widely used for program and hardware analysis. However, program traces for just a few seconds of execution are enormous, up to several terabytes in siz...
Graham D. Price, Manish Vachharajani
149
Voted
CCE
2006
15 years 5 months ago
New approaches for representing, analyzing and visualizing complex kinetic transformations
Complex kinetic mechanisms involving thousands of reacting species and tens of thousands of reactions are currently required for the rational analysis of modern combustion systems...
Ioannis P. Androulakis
COR
2006
140views more  COR 2006»
15 years 5 months ago
Aggregation for the probabilistic traveling salesman problem
5 In the probabilistic traveling salesman problem (PTSP), customers require a visit with a given probability, and the best solution is the tour through all customers with the lowe...
Ann Melissa Campbell
111
Voted
CORR
2006
Springer
92views Education» more  CORR 2006»
15 years 5 months ago
Myopic Coding in Wireless Networks
Abstract -We investigate the achievable rate of data transmission from sources to sinks through a multiple-relay network. We study achievable rates for omniscient coding, in which ...
Lawrence Ong, Mehul Motani
137
Voted
DSP
2006
15 years 5 months ago
Matrix pencil method for simultaneously estimating azimuth and elevation angles of arrival along with the frequency of the incom
In this paper we describe a method for simultaneously estimating the direction of arrival (DOA) of the signal along with its unknown frequency. In a typical DOA estimation problem...
Nuri Yilmazer, Raul Fernandez-Recio, Tapan K. Sark...
« Prev « First page 4511 / 4906 Last » Next »