Sciweavers

898 search results - page 98 / 180
» A Linear Tabling Mechanism
Sort
View
ITIIS
2010
140views more  ITIIS 2010»
13 years 2 months ago
RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks
Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local informa...
In Hur, Moonseong Kim, Jaewan Seo, Hyunseung Choo
ICDE
2012
IEEE
202views Database» more  ICDE 2012»
11 years 10 months ago
Recomputing Materialized Instances after Changes to Mappings and Data
—A major challenge faced by today’s information systems is that of evolution as data usage evolves or new data resources become available. Modern organizations sometimes exchan...
Todd J. Green, Zachary G. Ives
ICC
2007
IEEE
14 years 2 months ago
Optimization of the Self-Protecting Multipath for Deployment in Legacy Networks
—The self-protecting multipath (SPM) is a simple protection switching mechanism that can be implemented, e.g., by MPLS. We present a linear program for the optimization of the SP...
Michael Menth, Rüdiger Martin, Ulrich Spö...
ESWS
2007
Springer
14 years 2 months ago
Simple Algorithms for Predicate Suggestions Using Similarity and Co-occurrence
Abstract When creating Semantic Web data, users have to make a critical choice for a vocabulary: only through shared vocabularies can meaning be established. A centralised policy p...
Eyal Oren, Sebastian Gerke, Stefan Decker
ATS
2003
IEEE
93views Hardware» more  ATS 2003»
14 years 1 months ago
Optimal System-on-Chip Test Scheduling
1 In this paper, we show that the scheduling of tests on the test access mechanism (TAM) is equivalent to independent job scheduling on identical machines and we make use of an exi...
Erik Larsson, Hideo Fujiwara