Sciweavers

7065 search results - page 1281 / 1413
» Iterative Scheduling Algorithms
Sort
View
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
16 years 5 months ago
Energy and rate based MAC protocol for wireless sensor networks
Abstract-- Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote environments. This makes the problem of conserving energy at individ...
Rajgopal Kannan, Ramaraju Kalidindi, S. Sitharama ...
150
Voted
SIGMOD
2003
ACM
150views Database» more  SIGMOD 2003»
16 years 5 months ago
Capturing both Types and Constraints in Data Integration
We propose a framework for integrating data from multiple relational sources into an XML document that both conforms to a given DTD and satisfies predefined XML constraints. The f...
Michael Benedikt, Chee Yong Chan, Wenfei Fan, Juli...
ESORICS
2002
Springer
16 years 4 months ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski
DCC
2006
IEEE
16 years 4 months ago
Distortion Control for Queues with Deadlines
We investigate the optimum transmission strategy that minimizes the overall distortion for delaysensitive but distortion-tolerant data. We consider a set of source symbols residin...
Azadeh Faridi, Anthony Ephremides
DCC
2005
IEEE
16 years 4 months ago
The Near Resolvable 2-(13, 4, 3) Designs and Thirteen-Player Whist Tournaments
A v-player whist tournament is a schedule of games, where in each round the v players are partitioned into games of four players each with at most one player left over. In each ga...
Harri Haanpää, Petteri Kaski
« Prev « First page 1281 / 1413 Last » Next »