Sciweavers

210 search results - page 35 / 42
» Excludability and Bounded Computational Capacity
Sort
View
DAC
2008
ACM
14 years 11 months ago
Construction of concrete verification models from C++
C++ based verification methodologies are now emerging as the preferred method for SOC design. However most of the verification involving the C++ models are simulation based. The c...
Malay Haldar, Gagandeep Singh, Saurabh Prabhakar, ...
ICALP
2009
Springer
14 years 10 months ago
A Distributed and Oblivious Heap
This paper shows how to build and maintain a distributed heap which we call SHELL. In contrast to standard heaps, our heap is oblivious in the sense that its structure only depends...
Christian Scheideler, Stefan Schmid
PODS
2003
ACM
135views Database» more  PODS 2003»
14 years 10 months ago
Query-preserving watermarking of relational databases and XML documents
Watermarking allows robust and unobtrusive insertion of information in a digital document. Very recently, techniques have been proposed for watermarking relational databases or XM...
David Gross-Amblard
GLOBECOM
2007
IEEE
14 years 4 months ago
A Simple Multiuser and Single-User Dual-Mode Downlink System with Limited Feedback
— Limited feedback systems that simultaneously transmit to multiple users are noise power limited at low SNR and interference power limited at high SNR. Specifically, there is a...
Chun Kin Au-Yeung, Seung Young Park, David James L...
WIOPT
2006
IEEE
14 years 3 months ago
On the macroscopic effects of local interactions in multi-hop wireless networks
Abstract— The objective of the paper is to provide qualitative insight into the global effects of distributed mechanisms, such as carrier sense multiple access (CSMA) and rate co...
Venkatesh Saligrama, David Starobinski