Sciweavers

2347 search results - page 389 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
ANSS
2008
IEEE
14 years 2 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
14 years 2 months ago
Coverage control for nonholonomic agents
— Consider a coverage problem for a team of agents in the plane: target points appear sporadically over time in a bounded environment and must be visited by one of the agents. It...
John Enright, Ketan Savla, Emilio Frazzoli
CISIS
2008
IEEE
14 years 2 months ago
Latency Impact on Spin-Lock Algorithms for Modern Shared Memory Multiprocessors
In 2006, John Mellor-Crummey and Michael Scott received the Dijkstra Prize in Distributed Computing. This prize was for their 1991 paper on algorithms for scalable synchronization ...
Jan Christian Meyer, Anne C. Elster
FCCM
2008
IEEE
165views VLSI» more  FCCM 2008»
14 years 2 months ago
Performance Analysis with High-Level Languages for High-Performance Reconfigurable Computing
High-Level Languages (HLLs) for FPGAs (FieldProgrammable Gate Arrays) facilitate the use of reconfigurable computing resources for application developers by using familiar, higher...
John Curreri, Seth Koehler, Brian Holland, Alan D....
GMP
2008
IEEE
197views Solid Modeling» more  GMP 2008»
14 years 2 months ago
Determining Directional Contact Range of Two Convex Polyhedra
The directional contact range of two convex polyhedra is the range of positions that one of the polyhedron may locate along a given straight line so that the two polyhedra are in c...
Yi-King Choi, Xueqing Li, Fengguang Rong, Wenping ...