Sciweavers

204 search results - page 28 / 41
» Experimental Evaluation of Time-redundant Execution for a Br...
Sort
View
AFRICACRYPT
2010
Springer
14 years 2 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
ICPPW
2007
IEEE
14 years 1 months ago
Cooperative Localization with Pre-Knowledge Using Bayesian Network for Wireless Sensor Networks
Obtaining location information by localization schemes for sensor nodes makes applications of wireless sensor networks (WSNs) more meaningful. Most of localization schemes only us...
Shih-Hsiang Lo, Chun-Hsien Wu, Yeh-Ching Chung
EUROPAR
2007
Springer
14 years 1 months ago
Virtualization Techniques in Network Emulation Systems
The continuous increase of computational power has made viable the implementation of more and more sophisticated virtualization techniques. The use of virtualization in cluster env...
Roberto Canonico, Pasquale Di Gennaro, Vittorio Ma...
VLDB
2007
ACM
129views Database» more  VLDB 2007»
14 years 1 months ago
Processing Forecasting Queries
Forecasting future events based on historic data is useful in many domains like system management, adaptive query processing, environmental monitoring, and financial planning. We...
Songyun Duan, Shivnath Babu
DOCENG
2006
ACM
14 years 1 months ago
Fast and simple XML tree differencing by sequence alignment
With the advent of XML we have seen a renewed interest in methods for computing the difference between trees. Methods that include heuristic elements play an important role in pr...
Tancred Lindholm, Jaakko Kangasharju, Sasu Tarkoma