Sciweavers

1989 search results - page 70 / 398
» cost 2010
Sort
View
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 6 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi
PVLDB
2010
100views more  PVLDB 2010»
14 years 6 months ago
Efficient Proximity Detection among Mobile Users via Self-Tuning Policies
Given a set of users, their friend relationships, and a distance threshold per friend pair, the proximity detection problem is to find each pair of friends such that the Euclidean...
Man Lung Yiu, Leong Hou U, Simonas Saltenis, Kosta...
TMC
2010
125views more  TMC 2010»
14 years 6 months ago
Threshold-Based Media Streaming Optimization for Heterogeneous Wireless Networks
The integration of different wireless access technologies combined with the huge characteristic diversity of supported services in next-generation wireless systems creates a real h...
Ahmed H. Zahran, Cormac J. Sreenan
SODA
2010
ACM
168views Algorithms» more  SODA 2010»
15 years 9 months ago
An O(log n/log log n)-approximation algorithm for the asymmetric traveling salesman problem
We consider the Asymmetric Traveling Salesman problem for costs satisfying the triangle inequality. We derive a randomized algorithm which delivers a solution within a factor O(lo...
Arash Asadpour, Michel X. Goemans, Aleksander Madr...
NSDI
2010
15 years 1 months ago
SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies
Operators of data centers want a scalable network fabric that supports high bisection bandwidth and host mobility, but which costs very little to purchase and administer. Ethernet...
Jayaram Mudigonda, Praveen Yalagandula, Mohammad A...