Sciweavers

9730 search results - page 1781 / 1946
» Relating models of backtracking
Sort
View
VLDB
2005
ACM
96views Database» more  VLDB 2005»
15 years 10 months ago
Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype
Radio Frequency Identification (RFID) based item-level tracking holds the promise of revolutionizing supply-chain, retail store, and asset management applications. However, the hi...
Ying Hu, Seema Sundara, Timothy Chorma, Jagannatha...
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 10 months ago
Subjective-Cost Policy Routing
We study a model of path-vector routing in which nodes’ routing policies are based on subjective cost assessments of alternative routes. The routes are constrained by the requir...
Joan Feigenbaum, David R. Karger, Vahab S. Mirrokn...
MOBICOM
2004
ACM
15 years 10 months ago
PAVAN: a policy framework for content availabilty in vehicular ad-hoc networks
Advances in wireless communication, storage and processing are realizing next-generation in-vehicle entertainment systems. Even if hundreds of different video or audio titles are...
Shahram Ghandeharizadeh, Shyam Kapadia, Bhaskar Kr...
ATVA
2004
Springer
146views Hardware» more  ATVA 2004»
15 years 10 months ago
A Global Timed Bisimulation Preserving Abstraction for Parametric Time-Interval Automata
Timed Bisimulation Preserving Abstraction for Parametric Time-Interval Automata Akio Nakata, Tadaaki Tanimoto, Suguru Sasaki, Teruo Higashino Department of Information Networking, ...
Tadaaki Tanimoto, Suguru Sasaki, Akio Nakata, Teru...
EUROCRYPT
2004
Springer
15 years 10 months ago
Immunizing Encryption Schemes from Decryption Errors
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Cynthia Dwork, Moni Naor, Omer Reingold
« Prev « First page 1781 / 1946 Last » Next »