Sciweavers

193 search results - page 37 / 39
» Improving the Use of Multiplicity in UML Association
Sort
View
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 6 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
CCR
1999
92views more  CCR 1999»
13 years 6 months ago
YESSIR: a simple reservation mechanism for the Internet
Abstract-RSVP has been designed to support resource reservation in the Internet. However, it has two major problems: complexity and scalability. The former results in large message...
Ping Pan, Henning Schulzrinne
TKDE
2002
112views more  TKDE 2002»
13 years 5 months ago
Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems
Database systems for real-time applications must satisfy timing constraints associated with transactions. Typically, a timing constraint is expressed in the form of a deadline and ...
Chanjung Park, Seog Park, Sang Hyuk Son
TWC
2010
13 years 28 days ago
Joint channel estimation and resource allocation for MIMO systems-part I: single-user analysis
Multiple antenna systems are known to provide very large data rates, when the perfect channel state information (CSI) is available at the receiver. However, this requires the recei...
Alkan Soysal, Sennur Ulukus
PODS
2009
ACM
100views Database» more  PODS 2009»
14 years 6 months ago
Space-optimal heavy hitters with strong error bounds
The problem of finding heavy hitters and approximating the frequencies of items is at the heart of many problems in data stream analysis. It has been observed that several propose...
Radu Berinde, Graham Cormode, Piotr Indyk, Martin ...