Sciweavers

6800 search results - page 174 / 1360
» On optimizing collective communication
Sort
View
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 5 months ago
A Secure Communication Game with a Relay Helping the Eavesdropper
—In this work a four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is studied. The jammer relay does not hear the source trans...
Melda Yuksel, Xi Liu, Elza Erkip
INFOCOM
2009
IEEE
14 years 5 months ago
Toward Optimal Utilization of Shared Random Access Channels
—We consider a multipacket reception channel shared by several communication applications. This is the case, for example, in a single radio mesh network where neighboring cells u...
Joseph Naor, Danny Raz, Gabriel Scalosub
WWW
2008
ACM
14 years 11 months ago
Efficient multi-keyword search over p2p web
Current search mechanisms of DHT-based P2P systems can well handle a single keyword search problem. Other than single keyword search, multi-keyword search is quite popular and use...
Hanhua Chen, Hai Jin, Jiliang Wang, Lei Chen 0002,...
FOCS
2008
IEEE
13 years 11 months ago
Set Covering with our Eyes Closed
Given a universe U of n elements and a weighted collection S of m subsets of U, the universal set cover problem is to a-priori map each element u ∈ U to a set S(u) ∈ S contain...
Fabrizio Grandoni, Anupam Gupta, Stefano Leonardi,...
SCP
2010
163views more  SCP 2010»
13 years 5 months ago
Compact and efficient strings for Java
In several Java VMs, strings consist of two separate objects: metadata such as the string length are stored in the actual string object, while the string characters are stored in ...
Christian Häubl, Christian Wimmer, Hanspeter ...