Sciweavers

62 search results - page 7 / 13
» Experimental Bounds on the Usefulness of Personalized and To...
Sort
View
INFOCOM
2000
IEEE
15 years 4 months ago
Efficient Handoff Rerouting Algorithms: A Competitive On-Line Algorithmic Approach
—This paper considers the design of handoff rerouting algorithms for reducing the overall session cost in personal communication systems (PCS). Most modern communication systems ...
Yigal Bejerano, Israel Cidon, Joseph Naor
112
Voted
HUC
2010
Springer
15 years 16 days ago
Accuracy characterization of cell tower localization
Cell tower triangulation is a popular technique for determining the location of a mobile device. However, cell tower triangulation methods require the knowledge of the actual loca...
Jie Yang, Alexander Varshavsky, Hongbo Liu, Yingyi...
DAC
2004
ACM
16 years 1 months ago
A SAT-based algorithm for reparameterization in symbolic simulation
Parametric representations used for symbolic simulation of circuits usually use BDDs. After a few steps of symbolic simulation, state set representation is converted from one para...
Pankaj Chauhan, Edmund M. Clarke, Daniel Kroening
SIGMETRICS
2003
ACM
150views Hardware» more  SIGMETRICS 2003»
15 years 5 months ago
Conductance and congestion in power law graphs
It has been observed that the degrees of the topologies of several communication networks follow heavy tailed statistics. What is the impact of such heavy tailed statistics on the...
Christos Gkantsidis, Milena Mihail, Amin Saberi
JUCS
2010
124views more  JUCS 2010»
14 years 10 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck