Sciweavers

1579 search results - page 269 / 316
» On the Constructions of Constant-Weight Codes
Sort
View
ADHOC
2010
163views more  ADHOC 2010»
14 years 10 months ago
A probabilistic method for cooperative hierarchical aggregation of data in VANETs
We propose an algorithm for the hierarchical aggregation of observations in dissemination-based, distributed traffic information systems. Instead of transmitting observed paramete...
Christian Lochert, Björn Scheuermann, Martin ...
ACTAC
2008
94views more  ACTAC 2008»
14 years 10 months ago
Effect Preservation in Transaction Processing in Rule Triggering Systems
Rules provide an expressive means for implementing database behavior: They cope with changes and their ramifications. Rules are commonly used for integrity enforcement, i.e., for ...
Mira Balaban, Steffen Jurk
CORR
2010
Springer
99views Education» more  CORR 2010»
14 years 9 months ago
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits
Abstract--We investigate the problem of maintaining an encoded distributed storage system when some nodes contain adversarial errors. Using the error-correction capabilities that a...
Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tr...
CORR
2010
Springer
173views Education» more  CORR 2010»
14 years 9 months ago
Automatic Modular Abstractions for Template Numerical Constraints
c Modular Abstractions for Template Numerical Constraints David Monniaux May 26, 2010 We propose a method for automatically generating abstract transformstatic analysis by abstrac...
David Monniaux
CORR
2008
Springer
137views Education» more  CORR 2008»
14 years 9 months ago
Design and Implementation Aspects of a novel Java P2P Simulator with GUI
Peer-to-peer networks consist of thousands or millions of nodes that might join and leave arbitrarily. The evaluation of new protocols in real environments is many times practical...
Vassilios Chrissikopoulos, George Papaloukopoulos,...