Sciweavers

24529 search results - page 4779 / 4906
» Computing on Authenticated Data
Sort
View
116
Voted
SYNASC
2006
IEEE
103views Algorithms» more  SYNASC 2006»
15 years 8 months ago
Incremental Deterministic Planning
We present a new planning algorithm that formulates the planning problem as a counting satisfiability problem in which the number of available solutions guides the planner determ...
Stefan Andrei, Wei-Ngan Chin, Martin C. Rinard
135
Voted
VLSID
2006
IEEE
169views VLSI» more  VLSID 2006»
15 years 8 months ago
A Low Leakage and SNM Free SRAM Cell Design in Deep Sub Micron CMOS Technology
As the IC process technology scales, the oxide thickness and operating voltage continues to decrease. The gate oxide thickness in recent and future IC process technology has appro...
Sanjeev K. Jain, Pankaj Agarwal
122
Voted
WIOPT
2006
IEEE
15 years 8 months ago
Analytical modeling of ad hoc networks that utilize space-time coding
— This paper presents the first analytical model for ad hoc networks equipped with multiple-input multiple-output (MIMO) radios using space-time coding (STC) that considers the ...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves
131
Voted
ACMACE
2006
ACM
15 years 8 months ago
An empirical evaluation of TCP performance in online games
A fundamental design question to ask in the development of a network game is—Which transport protocol should be used—TCP, UDP, or some other protocols? Seeking an objective an...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
154
Voted
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
15 years 8 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
« Prev « First page 4779 / 4906 Last » Next »