Sciweavers

14078 search results - page 2620 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
123
Voted
INFOSCALE
2006
ACM
15 years 9 months ago
A library of constructive skeletons for sequential style of parallel programming
Abstract— With the increasing popularity of parallel programming environments such as PC clusters, more and more sequential programmers, with little knowledge about parallel arch...
Kiminori Matsuzaki, Hideya Iwasaki, Kento Emoto, Z...
143
Voted
IWCMC
2006
ACM
15 years 9 months ago
Priority-based receiver-side relay election in wireless ad hoc sensor networks
Receiver-side relay election has been recently proposed as an alternative to transmitter-side relay selection in wireless ad hoc networks. In this paper we study different priori...
Komlan Egoh, Swades De
116
Voted
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
118
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Component based channel assignment in single radio, multi-channel ad hoc networks
In this paper, we consider the channel assignment problem in single radio multi-channel mobile ad-hoc networks. Specifically, we investigate the granularity of channel assignment...
Ramanuja Vedantham, Sandeep Kakumanu, Sriram Laksh...
118
Voted
MOBIWAC
2006
ACM
15 years 9 months ago
Ad hoc routing based on the stability of routes
Some reactive ad hoc protocols allow the discovery and/or storage of multiple paths to the same destination node. The selection of the path to utilize is commonly based on the cri...
Alicia Triviño-Cabrera, Irene Nieves-P&eacu...
« Prev « First page 2620 / 2816 Last » Next »