Sciweavers

2206 search results - page 353 / 442
» On the power of coercion abstraction
Sort
View
TOIT
2008
115views more  TOIT 2008»
13 years 10 months ago
Resource space model, OWL and database: Mapping and integration
s exhibits diversity in the real world, mental abstraction world, document world, and machine world. Studying mappings between different forms of semantics helps unveil the uniform...
Hai Zhuge, Yunpeng Xing, Peng Shi
TON
2008
125views more  TON 2008»
13 years 10 months ago
Two techniques for fast computation of constrained shortest paths
Abstract-- Computing constrained shortest paths is fundamental to some important network functions such as QoS routing, which is to find the cheapest path that satisfies certain co...
Shigang Chen, Meongchul Song, Sartaj Sahni
TON
2008
106views more  TON 2008»
13 years 10 months ago
On static and dynamic partitioning behavior of large-scale P2P networks
Abstract--In this paper, we analyze the problem of network disconnection in the context of large-scale P2P networks and understand how both static and dynamic patterns of node fail...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
TSP
2008
88views more  TSP 2008»
13 years 10 months ago
Statistical Performance of MUSIC-Like Algorithms in Resolving Noncircular Sources
Abstract--This paper addresses the resolution of the conventional and noncircular MUSIC algorithms for arbitrary circular and noncircular second-order distributions of two uncorrel...
Habti Abeida, Jean Pierre Delmas
TVLSI
2008
144views more  TVLSI 2008»
13 years 10 months ago
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective
Abstract--Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedde...
Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-...