Sciweavers

1291 search results - page 140 / 259
» Computing the multiplicity structure in solving polynomial s...
Sort
View
EUROCRYPT
2010
Springer
15 years 6 months ago
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryposystem relies on the use of error-correcting codes. Since...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...
128
Voted
DCOSS
2006
Springer
15 years 5 months ago
Approximation Algorithms for Power-Aware Scheduling of Wireless Sensor Networks with Rate and Duty-Cycle Constraints
We develop algorithms for finding the minimum energy transmission schedule for duty-cycle and rate constrained wireless sensor nodes transmitting over an interference channel. Sinc...
Rajgopal Kannan, Shuangqing Wei
PERCOM
2010
ACM
15 years 3 days ago
Cloud-assisted mobile desktop search
—With the advent of the Internet, searching for information became a fundamental part of our daily computing. When large storage devices were integrated to our personal computers...
Eemil Lagerspetz, Sasu Tarkoma
MOBICOM
2003
ACM
15 years 7 months ago
Minimum energy disjoint path routing in wireless ad-hoc networks
We develop algorithms for finding minimum energy disjoint paths in an all-wireless network, for both the node and linkdisjoint cases. Our major results include a novel polynomial...
Anand Srinivas, Eytan Modiano
RTSS
1999
IEEE
15 years 6 months ago
A Scalable Solution to the Multi-Resource QoS Problem
The problem of maximizing system utility by allocating a single finite resource to satisfy discrete Quality of Service (QoS) requirements of multiple applications along multiple Q...
Chen Lee, John P. Lehoczky, Daniel P. Siewiorek, R...