Sciweavers

811 search results - page 161 / 163
» When Novelty Is Not Enough
Sort
View
RTAS
2011
IEEE
14 years 5 months ago
Virtual-CPU Scheduling in the Quest Operating System
This paper describes the scheduling framework for a new operating system called “Quest”. The three main goals of Quest are to ensure safety, predictability and efficiency of ...
Matthew Danish, Ye Li, Richard West
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
14 years 5 months ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
INFOCOM
2011
IEEE
14 years 5 months ago
Experimental evaluation of optimal CSMA
Abstract—By ‘optimal CSMA’ we denote a promising approach to maximize throughput-based utility in wireless networks without message passing or synchronization among nodes. De...
Bruno Nardelli, Jinsung Lee, Kangwook Lee, Yung Yi...
214
Voted
LACL
2011
Springer
14 years 4 months ago
Using Logic in the Generation of Referring Expressions
The problem of generating referring expressions (GRE) is an important task in natural language generation. In this paper, we advocate for the use of logical languages in the output...
Carlos Areces, Santiago Figueira, Daniel Gor&iacut...
111
Voted
SIGMOD
2011
ACM
189views Database» more  SIGMOD 2011»
14 years 4 months ago
We challenge you to certify your updates
Correctness of data residing in a database is vital. While integrity constraint enforcement can often ensure data consistency, it is inadequate to protect against updates that inv...
Su Chen, Xin Luna Dong, Laks V. S. Lakshmanan, Div...