Sciweavers

66 search results - page 10 / 14
» A technique for overlapping computation and communication fo...
Sort
View
ICICS
2005
Springer
14 years 29 days ago
Private Itemset Support Counting
Private itemset support counting (PISC) is a basic building block of various privacy-preserving data mining algorithms. Briefly, in PISC, Client wants to know the support of her i...
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
INFOCOM
2003
IEEE
14 years 22 days ago
Protection Mechanisms for Optical WDM Networks based on Wavelength Converter
Abstract— This paper studies the problem of designing survivable optical wavelength division multiplexed (WDM) networks. A wavelength-routed wide area backbone network supporting...
Sunil Gowda, Krishna M. Sivalingam
EUROPAR
2006
Springer
13 years 11 months ago
Master-Slave Tasking on Asymmetric Networks
Abstract. This paper presents new techniques for master-slave tasking on treeshaped networks with fully heterogeneous communication and processing resources. A large number of inde...
Cyril Banino-Rokkones, Olivier Beaumont, Lasse Nat...
MOBIWAC
2009
ACM
14 years 1 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
ICRA
2005
IEEE
111views Robotics» more  ICRA 2005»
14 years 1 months ago
Game Theoretic Control for Robot Teams
— In the real world, noisy sensors and limited communication make it difficult for robot teams to coordinate in tightly coupled tasks. Team members cannot simply apply single-ro...
Rosemary Emery-Montemerlo, Geoffrey J. Gordon, Jef...