Sciweavers

898 search results - page 145 / 180
» A Linear Tabling Mechanism
Sort
View
ICDCS
2009
IEEE
14 years 2 months ago
Stochastic Multicast with Network Coding
The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource ...
Ajay Gopinathan, Zongpeng Li
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Adaptive-ID Secure Revocable Identity-Based Encryption
Abstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has bee...
Benoît Libert, Damien Vergnaud
DATE
2009
IEEE
101views Hardware» more  DATE 2009»
14 years 2 months ago
Static analysis to mitigate soft errors in register files
—With continuous technology scaling, soft errors are becoming an increasingly important design concern even for earth-bound applications. While compiler approaches have the poten...
Jongeun Lee, Aviral Shrivastava
ICRA
2009
IEEE
140views Robotics» more  ICRA 2009»
14 years 2 months ago
Passive force analysis with elastic contacts for fixturing and grasping
— Unlike active force closure, which is a property for the multi-finger robotic hand grasping, passive force closure are involved in the grasping systems with constraining devic...
Tong Liu, Michael Yu Wang
INFOCOM
2009
IEEE
14 years 2 months ago
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints
Continuous monitoring and diagnosis of network performance are of crucial importance for the Internet access service and virtual private network (VPN) service providers. Various o...
Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wa...