Sciweavers

5123 search results - page 48 / 1025
» Performance and Security Tradeoff
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding
—This paper characterizes the throughput-delay tradeoffs in mobile ad hoc networks (MANETs) with network coding, and compares results in the situation where only replication and ...
Chi Zhang, Yuguang Fang, Xiaoyan Zhu
INFOCOM
2006
IEEE
15 years 4 months ago
Analyzing the Energy-Latency Trade-Off During the Deployment of Sensor Networks
— The inherent trade-off between energy-efficiency and rapidity of event dissemination is characteristic for wireless sensor networks. Scarcity of energy renders it necessary fo...
Thomas Moscibroda, Pascal von Rickenbach, Roger Wa...
EDBT
2008
ACM
154views Database» more  EDBT 2008»
15 years 10 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
DAC
1993
ACM
15 years 2 months ago
On Area/Depth Trade-off in LUT-Based FPGA Technology Mapping
In this paper we study the area and depth trade-off in LUT based FPGA technology mapping. Starting from a depth-optimal mapping solution, we perform a number of depth relaxation o...
Jason Cong, Yuzheng Ding
CHI
2008
ACM
15 years 10 months ago
Fitts' throughput and the speed-accuracy tradeoff
We describe an experiment to test the hypothesis that Fitts' throughput is independent of the speed-accuracy tradeoff. Eighteen participants used a mouse in performing a tota...
I. Scott MacKenzie, Poika Isokoski