Sciweavers

1691 search results - page 182 / 339
» The Delayed k-Server Problem
Sort
View
ICCAD
2006
IEEE
124views Hardware» more  ICCAD 2006»
16 years 1 months ago
Combinatorial algorithms for fast clock mesh optimization
We present a fast and efficient combinatorial algorithm to simultaneously identify the candidate locations as well as the sizes of the buffers driving a clock mesh. Due to the hi...
Ganesh Venkataraman, Zhuo Feng, Jiang Hu, Peng Li
HICSS
2009
IEEE
90views Biometrics» more  HICSS 2009»
15 years 11 months ago
Retrospective Cued Recall: A Method for Accurately Recalling Previous User Behaviors
A common problem in many user studies is gathering natural user behavior unintrusively over a long period of time. We describe a methodology for conducting passive longitudinal st...
Daniel M. Russell, Mike Oren
WISE
2009
Springer
15 years 11 months ago
An Integrated Declarative Approach to Web Services Composition and Monitoring
Abstract. In this paper we propose a constraint based declarative approach for Web services composition and monitoring problem. Our apllows user to build the abstract composition b...
Ehtesham Zahoor, Olivier Perrin, Claude Godart
INFOCOM
2009
IEEE
15 years 11 months ago
TDMA Scheduling in Long-Distance WiFi Networks
—In the last few years, long-distance WiFi networks have been used to provide Internet connectivity in rural areas. The strong requirement to support real-time applications in th...
Debmalya Panigrahi, Bhaskaran Raman
APNOMS
2009
Springer
15 years 11 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong