Sciweavers

4037 search results - page 254 / 808
» Routing without ordering
Sort
View
ICDT
2005
ACM
130views Database» more  ICDT 2005»
15 years 6 months ago
Rewriting Queries Using Views with Access Patterns Under Integrity Constraints
We study the problem of rewriting queries using views in the presence of access patterns, integrity constraints, disjunction, and negation. We provide asymptotically optimal algori...
Alin Deutsch, Bertram Ludäscher, Alan Nash
ICRA
1994
IEEE
124views Robotics» more  ICRA 1994»
15 years 4 months ago
Accurate Insertion Strategies Using Simple Optical Sensors
Peg-in-hole insertion is not only a longstanding problem in robotics but the most common automated mechanical assembly task [10]. In this paper we present a high precision, self-c...
Eric Paulos, John F. Canny
NSDI
2008
15 years 3 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
127
Voted
GLOBECOM
2008
IEEE
15 years 27 days ago
Many-to-Many Traffic Grooming in WDM Mesh Networks
In many-to-many communication, a session consists of group of users (we call them members) where each one of the members transmits its traffic to all other members in the group. Th...
Mohammad A. Saleh, Ahmed E. Kamal
113
Voted
ICUMT
2009
14 years 10 months ago
Free-CLASH - improved localization-free clustering in large wireless sensor networks
This paper investigates topology management of large wireless sensor networks. Due to their random deployment, nodes have to organize themselves as energy efficient as possible to ...
Jakob Salzmann, Ralf Behnke, Jiaxi You, Dirk Timme...