Sciweavers

2652 search results - page 316 / 531
» Privacy-preserving linear programming
Sort
View
135
Voted
TASE
2008
IEEE
15 years 9 months ago
A Fundamental Permission Interpretation for Ownership Types
This paper builds a bridge between permissions and ownership types. Ownership is a recognized alias control technique. With ownership, each object is assigned an owner and any acc...
Yang Zhao, John Boyland
116
Voted
CEC
2007
IEEE
15 years 9 months ago
A histogram-matching approach to the evolution of bin-packing strategies
Abstract— We present a novel algorithm for the onedimension offline bin packing problem with discrete item sizes based on the notion of matching the item-size histogram with the...
Riccardo Poli, John Woodward, Edmund K. Burke
148
Voted
DATE
2007
IEEE
185views Hardware» more  DATE 2007»
15 years 9 months ago
An ILP formulation for system-level application mapping on network processor architectures
Current day network processors incorporate several architectural features including symmetric multi-processing (SMP), block multi-threading, and multiple memory elements to suppor...
Christopher Ostler, Karam S. Chatha
104
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
Cognitive Medium Access: A Protocol for Enhancing Coexistence in WLAN Bands
— In this paper we propose Cognitive Medium Access (CMA), a protocol aimed at improving coexistence with a set of independently evolving WLAN bands. A time-slotted physical layer...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
132
Voted
ICC
2007
IEEE
138views Communications» more  ICC 2007»
15 years 9 months ago
Optimal Observation Scheduling for connected target coverage problem in Wireless Sensor Networks
— In this paper, we consider the problem of scheduling sensor activity to maximize network lifetime while maintaining both discrete targets coverage and network connectivity. We ...
Qun Zhao, Mohan Gurusamy