Sciweavers

892 search results - page 130 / 179
» Efficient Querying of Distributed Resources in Mediator Syst...
Sort
View
118
Voted
COLCOM
2007
IEEE
15 years 7 months ago
Message replication in unstructured peer-to-peer network
—Recently, unstructured peer-to-peer (P2P) applications have become extremely popular. Searching in these networks has been a hot research topic. Flooding-based searching, which ...
Osama Al-Haj Hassan, Lakshmish Ramaswamy
ATAL
2010
Springer
15 years 1 months ago
Resource-bounded alternating-time temporal logic
Many problems in AI and multi-agent systems research are most naturally formulated in terms of the abilities of a coalition of agents. There exist several excellent logical tools ...
Natasha Alechina, Brian Logan, Nguyen Hoang Nga, A...
EUROPAR
2006
Springer
15 years 4 months ago
An Embedded Systems Programming Environment for C
Resource constraints are a major concern with the design, development, and deployment of embedded systems. Embedded systems are highly hardware-dependent and have little computatio...
Bernd Burgstaller, Bernhard Scholz, M. Anton Ertl
121
Voted
TSP
2010
14 years 7 months ago
Uplink synchronization in OFDMA spectrum-sharing systems
Spectrum sharing employs dynamic allocation of frequency resources for a more efficient use of the radio spectrum. Despite its appealing features, this technology inevitably compli...
Luca Sanguinetti, Michele Morelli, H. Vincent Poor
122
Voted
CCS
2008
ACM
15 years 2 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...