Sciweavers

4281 search results - page 781 / 857
» How to Disembed a Program
Sort
View
AINA
2005
IEEE
14 years 4 months ago
Relational Database Operations Modeling with UML
Many existing software applications involve complex application layer implemented in OO programming languages and at the same time use relational database systems as back-end data...
Shuxin Yin, Indrakshi Ray
DATE
2005
IEEE
146views Hardware» more  DATE 2005»
14 years 4 months ago
Nonuniform Banking for Reducing Memory Energy Consumption
Main memories can consume a large percentage of overall energy in many data-intensive embedded applications. The past research proposed and evaluated memory banking as a possible ...
Ozcan Ozturk, Mahmut T. Kandemir
FOCS
2005
IEEE
14 years 4 months ago
On the Impossibility of Obfuscation with Auxiliary Input
Barak et al. formalized the notion of obfuscation, and showed that there exist (contrived) classes of functions that cannot be obfuscated. In contrast, Canetti and Wee showed how ...
Shafi Goldwasser, Yael Tauman Kalai
INFOCOM
2005
IEEE
14 years 4 months ago
Asymptotically optimal transmission policies for low-power wireless sensor networks
— We consider wireless sensor networks with multiple gateways and multiple classes of traffic carrying data generated by different sensory inputs. The objective is to devise joi...
Ioannis Ch. Paschalidis, Wei Lai, David Starobinsk...
IPPS
2005
IEEE
14 years 4 months ago
Connection-less TCP
TCP is an important protocol in high-performance computing. It is used extensively in graphics programs and file systems and it is often the protocol used for the cluster control...
Patricia Gilfeather, Arthur B. Maccabe