Sciweavers

4270 search results - page 800 / 854
» A Permutation Approach to Validation
Sort
View
157
Voted
ISPD
2005
ACM
205views Hardware» more  ISPD 2005»
15 years 9 months ago
Coupling aware timing optimization and antenna avoidance in layer assignment
The sustained progress of VLSI technology has altered the landscape of routing which is a major physical design stage. For timing driven routings, traditional approaches which con...
Di Wu, Jiang Hu, Rabi N. Mahapatra
108
Voted
MOBIDE
2005
ACM
15 years 9 months ago
Recovery of mobile internet transactions: algorithm, implementation and analysis
The increasing popularity of mobile devices and the support of web portals towards performing transactions from these mobile devices has enabled business on the move. However, int...
Shashi Anand, Krithi Ramamritham
166
Voted
SENSYS
2005
ACM
15 years 9 months ago
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
— In this paper, we propose a dynamic en-route filtering scheme for false data injection attacks in wireless sensor networks. In sensor networks, adversaries can inject false da...
Zhen Yu, Yong Guan
95
Voted
WPES
2005
ACM
15 years 9 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
130
Voted
CAEPIA
2005
Springer
15 years 9 months ago
Mapping Conformant Planning into SAT Through Compilation and Projection
Conformant planning is a variation of classical AI planning where the initial state is partially known and actions can have nondeterministic effects. While a classical plan must a...
Héctor Palacios, Hector Geffner