Sciweavers

3571 search results - page 658 / 715
» On the Power of Imperfect Information
Sort
View
FOCS
2006
IEEE
14 years 2 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...
GLOBECOM
2006
IEEE
14 years 2 months ago
Progressive Accumulative Routing in Wireless Networks
This paper considers a sensor network where relay nodes cooperate in order to minimize the total energy consumption for the unicast transmission of a message from a single source ...
Raymond Yim, Neelesh B. Mehta, Andreas F. Molisch,...
ICDE
2006
IEEE
127views Database» more  ICDE 2006»
14 years 2 months ago
Processing Recursive XQuery over XML Streams: The Raindrop Approach
— XML stream applications bring the challenge of efficiently processing queries on sequentially accessible tokenbased data. For efficient processing of queries, we need to ensu...
Mingzhu Wei, Ming Li, Elke A. Rundensteiner, Mural...
ISCA
2006
IEEE
169views Hardware» more  ISCA 2006»
14 years 2 months ago
Balanced Cache: Reducing Conflict Misses of Direct-Mapped Caches
Level one cache normally resides on a processor’s critical path, which determines the clock frequency. Directmapped caches exhibit fast access time but poor hit rates compared w...
Chuanjun Zhang
ISCAS
2006
IEEE
162views Hardware» more  ISCAS 2006»
14 years 2 months ago
Silicon neurons that phase-lock
Abstract—We present a silicon neuron with a dynamic, active leak that enables precise spike-timing with respect to a time-varying input signal. Our neuron models the mammalian bu...
J. H. Wittig Jr., Kwabena Boahen