Sciweavers

596 search results - page 85 / 120
» Complexity Analysis by Graph Rewriting
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
DIALM
2004
ACM
100views Algorithms» more  DIALM 2004»
14 years 1 months ago
Virtual coordinates for ad hoc and sensor networks
In many applications of wireless ad hoc and sensor networks, position-awareness is of great importance. Often, as in the case of geometric routing, it is sufficient to have virtua...
Thomas Moscibroda, Regina O'Dell, Mirjam Wattenhof...
PODC
2009
ACM
14 years 23 days ago
Brief announcement: locality-based aggregate computation in wireless sensor networks
We present DRR-gossip, an energy-efficient and robust aggregate computation algorithm in wireless sensor networks. We prove that the DRR-gossip algorithm requires O(n) messages a...
Jen-Yeu Chen, Gopal Pandurangan, Jianghai Hu
SEKE
2001
Springer
14 years 16 days ago
Gadget: A Tool for Extracting the Dynamic Structure of Java Programs
Source code analysis and inspection does not provide enough information to describe the structure of an objectoriented program completely because there are components and relation...
Juan Gargiulo, Spiros Mancoridis
VLDB
1990
ACM
77views Database» more  VLDB 1990»
14 years 3 days ago
Efficient Main Memory Data Management Using the DBGraph Storage Model
Therequirementsfor amain memorydatastoragemodel are both compactnessand efficient processing for all database operations. The DBGraph storage model, proposed in this paper, achiev...
Philippe Pucheral, Jean-Marc Thévenin, Patr...