Sciweavers

2125 search results - page 138 / 425
» Points with Type-2 Operations
Sort
View
128
Voted
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
16 years 4 months ago
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication
Recently, the new Multibase Non-Adjacent Form (mbNAF) method was introduced and shown to speed up the execution of the scalar multiplication with an efficient use of multiple bases...
Patrick Longa, Catherine H. Gebotys
131
Voted
OSDI
2004
ACM
16 years 3 months ago
Configuration Debugging as Search: Finding the Needle in the Haystack
This work addresses the problem of diagnosing configuration errors that cause a system to function incorrectly. For example, a change to the local firewall policy could cause a ne...
Andrew Whitaker, Richard S. Cox, Steven D. Gribble
VLDB
2009
ACM
159views Database» more  VLDB 2009»
16 years 3 months ago
Anytime measures for top-k algorithms on exact and fuzzy data sets
Top-k queries on large multi-attribute data sets are fundamental operations in information retrieval and ranking applications. In this article, we initiate research on the anytime ...
Benjamin Arai, Gautam Das, Dimitrios Gunopulos, Ni...
119
Voted
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 10 months ago
Design and Evaluation of a Multilevel Decoder for Satellite Communications
—In this paper, we propose a multilevel coding (MLC) scheme suitable for satellite communications, where different QoS levels are required. We introduce a novel characterization ...
Aharon Vargas, Marco Breiling, Wolfgang H. Gerstac...
ICC
2009
IEEE
147views Communications» more  ICC 2009»
15 years 10 months ago
Distributed Quality-Lifetime Maximization in Wireless Video Sensor Networks
—Owing to the availability of low-cost and low-power CMOS cameras, Wireless Video Sensor Networks (WVSN) has recently become a reality. However video encoding is still a costly p...
Eren Gürses, Yuan Lin, Raouf Boutaba