Sciweavers

5344 search results - page 923 / 1069
» Privacy-Preserving Set Operations
Sort
View
146
Voted
MOBICOM
2000
ACM
15 years 7 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson
RTSS
1999
IEEE
15 years 7 months ago
Design and Implementation of Statistical Rate Monotonic Scheduling in KURT Linux
Statistical Rate Monotonic Scheduling (SRMS) is a generalization of the classical RMS results of Liu and Layland [LL73] for periodic tasks with highly variable execution times and...
Alia Atlas, Azer Bestavros
140
Voted
EUROPAR
1999
Springer
15 years 7 months ago
Annotated Memory References: A Mechanism for Informed Cache Management
Processor cycle time continues to decrease faster than main memory access times, placing higher demands on cache memory hierarchy performance. To meet these demands, conventional ...
Alvin R. Lebeck, David R. Raymond, Chia-Lin Yang, ...
STACS
1999
Springer
15 years 7 months ago
The Weakness of Self-Complementation
Model checking is a method for the verification of systems with respect to their specifications. Symbolic model-checking, which enables the verification of large systems, procee...
Orna Kupferman, Moshe Y. Vardi
PKDD
1998
Springer
273views Data Mining» more  PKDD 1998»
15 years 7 months ago
TextVis: An Integrated Visual Environment for Text Mining
TextVis is a visual data mining system for document collections. Such a collection represents an application domain, and the primary goal of the system is to derive patterns that p...
David Landau, Ronen Feldman, Yonatan Aumann, Moshe...