Sciweavers

4266 search results - page 177 / 854
» The container loading problem
Sort
View
ISLPED
2006
ACM
106views Hardware» more  ISLPED 2006»
15 years 10 months ago
Maximizing the lifetime of embedded systems powered by fuel cell-battery hybrids
—Fuel cell (FC) is a viable alternative power source for portable applications; it has higher energy density than traditional Li-ion battery and thus can achieve longer lifetime ...
Jianli Zhuo, Chaitali Chakrabarti, Naehyuck Chang,...
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 9 months ago
Range Queries in Trie-Structured Overlays
Among the open problems in P2P systems, support for non-trivial search predicates, standardized query languages, distributed query processing, query load balancing, and quality of...
Anwitaman Datta, Manfred Hauswirth, Renault John, ...
MINENET
2005
ACM
15 years 9 months ago
Experiences with a continuous network tracing infrastructure
One of the most pressing problems in network research is the lack of long-term trace data from ISPs. The Internet carries an enormous volume and variety of data; mining this data ...
Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin...
SIGMETRICS
2005
ACM
101views Hardware» more  SIGMETRICS 2005»
15 years 9 months ago
Fundamental bounds on the accuracy of network performance measurements
This paper considers the basic problem of “how accurate can we make Internet performance measurements”. The answer is somewhat counter-intuitive in that there are bounds on th...
Matthew Roughan
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 9 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya