Sciweavers

1414 search results - page 139 / 283
» Cover Time and Broadcast Time
Sort
View
VTC
2010
IEEE
125views Communications» more  VTC 2010»
14 years 8 months ago
Solving the Coupon Collector's Problem for the Safety Beaconing in the IEEE 802.11p WAVE
—For the WAVE applications built on safety beacons, it is imperative that the neighboring vehicle information be collected as quickly and efficiently as possible. But the unreli...
Hyundoc Seo, Sangki Yun, Hyogon Kim
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
15 years 2 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three di...
David Naccache, Michael Tunstall
ISCA
1999
IEEE
94views Hardware» more  ISCA 1999»
15 years 2 months ago
A Performance Comparison of Contemporary DRAM Architectures
In response to the growing gap between memory access time and processor speed, DRAM manufacturers have created several new DRAM architectures. This paper presents a simulation-bas...
Vinodh Cuppu, Bruce L. Jacob, Brian Davis, Trevor ...
MANSCI
2008
128views more  MANSCI 2008»
14 years 10 months ago
Optimizing Call Center Staffing Using Simulation and Analytic Center Cutting-Plane Methods
We consider the problem of minimizing staffing costs in an inbound call center, while maintaining an acceptable level of service in multiple time periods. The problem is complicat...
Júlíus Atlason, Marina A. Epelman, S...
EDBT
2008
ACM
128views Database» more  EDBT 2008»
15 years 10 months ago
Processing transitive nearest-neighbor queries in multi-channel access environments
Wireless broadcast is an efficient way for information dissemination due to its good scalability [10]. Existing works typically assume mobile devices, such as cell phones and PDAs...
Xiao Zhang, Wang-Chien Lee, Prasenjit Mitra, Baihu...