Sciweavers

241 search results - page 29 / 49
» Private Capacities in Mechanism Design
Sort
View
SODA
2003
ACM
121views Algorithms» more  SODA 2003»
13 years 8 months ago
Competitiveness via consensus
We introduce the following consensus estimate problem. Several processors hold private and possibly different lower bounds on a value. The processors do not communicate with each ...
Andrew V. Goldberg, Jason D. Hartline
CCS
2010
ACM
13 years 6 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
SENSYS
2009
ACM
14 years 2 months ago
A wireless sensor network for border surveillance
We will demonstrate a wireless sensor network system for the surveillance of critical areas and properties – e.g. borders. The system consists of up to 10 sensor nodes that moni...
Denise Dudek, Christian Haas, Andreas Kuntz, Marti...
EMSOFT
2008
Springer
13 years 9 months ago
Workload-based configuration of MEMS-based storage devices for mobile systems
Because of its small form factor, high capacity, and expected low cost, MEMS-based storage is a suitable storage technology for mobile systems. However, flash memory may outperfor...
Mohammed G. Khatib, Ethan L. Miller, Pieter H. Har...
ISLPED
2009
ACM
161views Hardware» more  ISLPED 2009»
14 years 1 months ago
Way guard: a segmented counting bloom filter approach to reducing energy for set-associative caches
The design trend of caches in modern processors continues to increase their capacity with higher associativity to cope with large data footprint and take advantage of feature size...
Mrinmoy Ghosh, Emre Özer, Simon Ford, Stuart ...