Sciweavers

5344 search results - page 904 / 1069
» Privacy-Preserving Set Operations
Sort
View
172
Voted
WICOMM
2011
14 years 10 months ago
A pragmatic approach to area coverage in hybrid wireless sensor networks
Success of Wireless Sensor Networks (WSN) largely depends on whether the deployed network can provide desired area coverage with acceptable network lifetime. This paper seeks to a...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
136
Voted
TSP
2010
14 years 10 months ago
On the shiftability of dual-tree complex wavelet transforms
The dual-tree complex wavelet transform (DT- WT) is known to exhibit better shift-invariance than the conventional discrete wavelet transform. We propose an amplitude-phase represe...
Kunal Narayan Chaudhury, Michael Unser
137
Voted
EUROSYS
2011
ACM
14 years 7 months ago
SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores
Buffer caches in operating systems keep active file blocks in memory to reduce disk accesses. Related studies have been focused on how to minimize buffer misses and the caused pe...
Xiaoning Ding, Kaibo Wang, Xiaodong Zhang
145
Voted
PLDI
2011
ACM
14 years 6 months ago
The tao of parallelism in algorithms
For more than thirty years, the parallel programming community has used the dependence graph as the main abstraction for reasoning about and exploiting parallelism in “regular...
Keshav Pingali, Donald Nguyen, Milind Kulkarni, Ma...
EMSOFT
2011
Springer
14 years 3 months ago
Hard-real-time scheduling of data-dependent tasks in embedded streaming applications
Most of the hard-real-time scheduling theory for multiprocessor systems assumes independent periodic or sporadic tasks. Such a simple task model is not directly applicable to mode...
Mohamed Bamakhrama, Todor Stefanov