Sciweavers

2584 search results - page 321 / 517
» On the Forward Checking Algorithm
Sort
View
114
Voted
WWW
2004
ACM
16 years 3 months ago
A novel heterogeneous data integration approach for p2p semantic link network
This paper proposes a novel approach to integrate heterogeneous data in P2P networks. The approach includes a tool for building P2P semantic link networks, mechanisms for peer sch...
Hai Zhuge, Jie Liu
VLDB
2007
ACM
161views Database» more  VLDB 2007»
16 years 2 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
150
Voted
PERCOM
2007
ACM
16 years 2 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
129
Voted
MOBIHOC
2008
ACM
16 years 2 months ago
Complexity of scheduling with analog network coding
In this paper we analyze the complexity of scheduling wireless links in the physical interference model with analog network coding capability. We study two models with different d...
Olga Goussevskaia, Roger Wattenhofer
ICC
2009
IEEE
140views Communications» more  ICC 2009»
15 years 9 months ago
Joint Scheduling and Relay Selection in One- and Two-Way Relay Networks with Buffering
— In most wireless relay networks, the source and relay nodes transmit successively via fixed time division (FTD) and each relay forwards a packet immediately upon receiving. In...
Lianghui Ding, Meixia Tao, Fan Yang, Wenjun Zhang