Sciweavers

263 search results - page 31 / 53
» Do we teach the right algorithm design techniques
Sort
View
148
Voted
ESAS
2004
Springer
15 years 9 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
IUI
2009
ACM
16 years 11 days ago
From geek to sleek: integrating task learning tools to support end users in real-world applications
Numerous techniques exist to help users automate repetitive tasks; however, none of these methods fully support enduser creation, use, and modification of the learned tasks. We pr...
Aaron Spaulding, Jim Blythe, Will Haines, Melinda ...
EDBT
2009
ACM
124views Database» more  EDBT 2009»
15 years 10 months ago
A sequential indexing scheme for flash-based embedded systems
NAND Flash has become the most popular stable storage medium for embedded systems. As on-board storage capacity increases, the need for efficient indexing techniques arises. Such ...
Shaoyi Yin, Philippe Pucheral, Xiaofeng Meng
DATE
2008
IEEE
113views Hardware» more  DATE 2008»
15 years 10 months ago
Random Stimulus Generation using Entropy and XOR Constraints
Despite the growing research effort in formal verification, constraint-based random simulation remains an integral part of design validation, especially for large design componen...
Stephen Plaza, Igor L. Markov, Valeria Bertacco
141
Voted
VTC
2008
IEEE
173views Communications» more  VTC 2008»
15 years 10 months ago
A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks
Abstract—Cross-layer routing and scheduling algorithms design for wireless backhaul mesh network has attracted much research interest recently. The network is expected to support...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung