Sciweavers

2059 search results - page 298 / 412
» A Directed Threshold - Signature Scheme
Sort
View
175
Voted
SECON
2007
IEEE
15 years 11 months ago
Facilitating an Active Transmit-only RFID System Through Receiver-based Processing
— Many asset tracking applications demand long-lived, low-cost, and continuous monitoring of a large number of items, which has posed a significant challenge to today’s RFID d...
Yu Zhang, Gautam D. Bhanage, Wade Trappe, Yanyong ...
115
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
Broadcasting in Sensor Networks: The Role of Local Information
Abstract— Flooding based strategies are conventionally employed to perform querying and broadcasting in sensor networks. These schemes have low hop-delays of Θ( 1 M(n) ) to reac...
Sundar Subramanian, Sanjay Shakkottai, Ari Arapost...
SASN
2006
ACM
15 years 10 months ago
Robust cooperative trust establishment for MANETs
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastr...
Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, ...
133
Voted
CF
2004
ACM
15 years 10 months ago
Combining compiler and runtime IPC predictions to reduce energy in next generation architectures
Next generation architectures will require innovative solutions to reduce energy consumption. One of the trends we expect is more extensive utilization of compiler information dir...
Saurabh Chheda, Osman S. Unsal, Israel Koren, C. M...
160
Voted
VLDB
2004
ACM
118views Database» more  VLDB 2004»
15 years 10 months ago
On the performance of bitmap indices for high cardinality attributes
It is well established that bitmap indices are efficient for read-only attributes with low attribute cardinalities. For an attribute with a high cardinality, the size of the bitma...
Kesheng Wu, Ekow J. Otoo, Arie Shoshani