Sciweavers

16921 search results - page 3379 / 3385
» Information Technology
Sort
View
CCS
2011
ACM
13 years 9 months ago
Proofs of ownership in remote storage systems
Cloud storage systems are becoming increasingly popular. A promising technology that keeps their cost down is deduplication, which stores only a single copy of repeating data. Cli...
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra...
DAC
2011
ACM
13 years 9 months ago
Supervised design space exploration by compositional approximation of Pareto sets
Technology scaling allows the integration of billions of transistors on the same die but CAD tools struggle in keeping up with the increasing design complexity. Design productivit...
Hung-Yi Liu, Ilias Diakonikolas, Michele Petracca,...
EMSOFT
2011
Springer
13 years 9 months ago
From boolean to quantitative synthesis
Motivated by improvements in constraint-solving technology and by the increase of routinely available computational power, partial-program synthesis is emerging as an effective a...
Pavol Cerný, Thomas A. Henzinger
ICDCS
2011
IEEE
13 years 9 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
MOBICOM
2012
ACM
13 years 1 days ago
MARVEL: multiple antenna based relative vehicle localizer
Access to relative location of nearby vehicles on the local roads or on the freeways is useful for providing critical alerts to the drivers, thereby enhancing their driving experi...
Dong Li, Tarun Bansal, Zhixue Lu, Prasun Sinha
« Prev « First page 3379 / 3385 Last » Next »