Sciweavers

40212 search results - page 7856 / 8043
» More
Sort
View
CASES
2010
ACM
15 years 2 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
143
Voted
CASES
2010
ACM
15 years 2 months ago
Resource recycling: putting idle resources to work on a composable accelerator
Mobile computing platforms in the form of smart phones, netbooks, and personal digital assistants have become an integral part of our everyday lives. Moving ahead to the future, m...
Yongjun Park, Hyunchul Park, Scott A. Mahlke, Sukj...
CCCG
2010
15 years 2 months ago
Determining the robustness of sensor barriers
Various notions of coverage provided by wireless sensor networks have attracted considerable attention over the past few years. In general, coverage can be expressed geometrically...
David G. Kirkpatrick
166
Voted
CIKM
2010
Springer
15 years 2 months ago
Manifold ranking with sink points for update summarization
Update summarization aims to create a summary over a topic-related multi-document dataset based on the assumption that the user has already read a set of earlier documents of the ...
Pan Du, Jiafeng Guo, Jin Zhang, Xueqi Cheng
146
Voted
COCOA
2010
Springer
15 years 2 months ago
Bounds for Nonadaptive Group Tests to Estimate the Amount of Defectives
The classical and well-studied group testing problem is to find d defectives in a set of n elements by group tests, which tell us for any chosen subset whether it contains defectiv...
Peter Damaschke, Azam Sheikh Muhammad
« Prev « First page 7856 / 8043 Last » Next »