Sciweavers

415 search results - page 51 / 83
» time 1994
Sort
View
132
Voted
SIGMOD
1994
ACM
175views Database» more  SIGMOD 1994»
15 years 4 months ago
Sleepers and Workaholics: Caching Strategies in Mobile Environments
In the mobile wireless computing environment of the future, a large number of users, equipped with low-powered palmtop machines, will query databases over wireless communication ch...
Daniel Barbará, Tomasz Imielinski
STOC
1994
ACM
134views Algorithms» more  STOC 1994»
15 years 4 months ago
A coding theorem for distributed computation
Shannon's Coding Theorem shows that in order to reliably transmit a message of T bits over a noisy communication channel, only a constant slowdown factor is necessary in the ...
Sridhar Rajagopalan, Leonard J. Schulman
139
Voted
SBP
2011
Springer
14 years 7 months ago
A Longitudinal View of the Relationship Between Social Marginalization and Obesity
We use 3 Waves of the Add Health data collected between 1994 and 2002 to conduct a longitudinal study of the relationship between social marginalization and the weight status of ad...
Andrea Apolloni, Achla Marathe, Zhengzheng Pan
110
Voted
ICCAD
1994
IEEE
117views Hardware» more  ICCAD 1994»
15 years 4 months ago
Optimization of critical paths in circuits with level-sensitive latches
A simple extension of the critical path method is presented which allows more accurate optimization of circuits with level-sensitive latches. The extended formulation provides a s...
Timothy M. Burks, Karem A. Sakallah
FSE
1994
Springer
134views Cryptology» more  FSE 1994»
15 years 4 months ago
Cryptanalysis of McGuffin
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to differential cryptanalysis as the DES. 1 McGuffin Schneier and...
Vincent Rijmen, Bart Preneel