Sciweavers

2625 search results - page 493 / 525
» Applications 2000
Sort
View
109
Voted
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
120
Voted
PLDI
2005
ACM
15 years 9 months ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
126
Voted
PODC
2005
ACM
15 years 9 months ago
Simultaneous broadcast revisited
Simultaneous Broadcast protocols allow different parties to broadcast values in parallel while guaranteeing mutual independence of the broadcast values. In this work, we study va...
Alejandro Hevia, Daniele Micciancio
144
Voted
ISAAC
2004
Springer
112views Algorithms» more  ISAAC 2004»
15 years 9 months ago
Dynamic Tree Cross Products
Abstract. Range searching over tree cross products – a variant of classic range searching – recently has been introduced by Buchsbaum et al. (Proc. 8th ESA, vol. 1879 of LNCS, ...
Marcus Raitner
105
Voted
CGO
2010
IEEE
15 years 9 months ago
Lightweight feedback-directed cross-module optimization
Cross-module inter-procedural compiler optimization (IPO) and Feedback-Directed Optimization (FDO) are two important compiler techniques delivering solid performance gains. The co...
David Xinliang Li, Raksit Ashok, Robert Hundt