Sciweavers

21324 search results - page 3811 / 4265
» Making the case for computing
Sort
View
NSDI
2008
15 years 7 months ago
BFT Protocols Under Fire
Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), ...
Atul Singh, Tathagata Das, Petros Maniatis, Peter ...
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
15 years 7 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
EDBT
2010
ACM
185views Database» more  EDBT 2010»
15 years 6 months ago
Probabilistic threshold k nearest neighbor queries over moving objects in symbolic indoor space
The availability of indoor positioning renders it possible to deploy location-based services in indoor spaces. Many such services will benefit from the efficient support for k n...
Bin Yang 0002, Hua Lu, Christian S. Jensen
160
Voted
APSCC
2008
IEEE
15 years 6 months ago
ABSRP- A Service Discovery Approach for Vehicular Ad Hoc Networks
A vehicular ad-hoc network (VANET) is a network of intelligent vehicles that communicate with other vehicles in the network. The main objective of VANET is to provide comfort and ...
Brijesh Kadri Mohandas, Amiya Nayak, Kshirasagar N...
GLVLSI
2010
IEEE
190views VLSI» more  GLVLSI 2010»
15 years 6 months ago
A linear statistical analysis for full-chip leakage power with spatial correlation
In this paper, we present an approved linear-time algorithm for statistical leakage analysis in the present of any spatial correlation condition (strong or weak). The new algorith...
Ruijing Shen, Sheldon X.-D. Tan, Jinjun Xiong
« Prev « First page 3811 / 4265 Last » Next »