Sciweavers

963 search results - page 176 / 193
» Escape Analysis on Lists
Sort
View
DIALM
2005
ACM
125views Algorithms» more  DIALM 2005»
14 years 11 months ago
Minimizing interference in ad hoc and sensor networks
Reducing interference is one of the main challenges in wireless communication, and particularly in ad hoc networks. The amount of interference experienced by a node v corresponds ...
Thomas Moscibroda, Roger Wattenhofer
CODES
2008
IEEE
14 years 11 months ago
Profiling of lossless-compression algorithms for a novel biomedical-implant architecture
In view of a booming market for microelectronic implants, our ongoing research work is focusing on the specification and design of a novel biomedical microprocessor core targeting...
Christos Strydis, Georgi Gaydadjiev
CONEXT
2008
ACM
14 years 11 months ago
Troubleshooting chronic conditions in large IP networks
Chronic network conditions are caused by performance impairing events that occur intermittently over an extended period of time. Such conditions can cause repeated performance deg...
Ajay Mahimkar, Jennifer Yates, Yin Zhang, Aman Sha...
CSCW
2008
ACM
14 years 11 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...
DAMON
2008
Springer
14 years 11 months ago
CAM conscious integrated answering of frequent elements and top-k queries over data streams
Frequent elements and top-k queries constitute an important class of queries for data stream analysis applications. Certain applications require answers for both frequent elements...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi