Sciweavers

204 search results - page 39 / 41
» Probabilistic Attributed Hashing
Sort
View
TKDE
2008
146views more  TKDE 2008»
13 years 8 months ago
Toward Managing Uncertain Spatial Information for Situational Awareness Applications
Situational awareness (SA) applications monitor the real world and the entities therein to support tasks such as rapid decision making, reasoning, and analysis. Raw input about unf...
Yiming Ma, Dmitri V. Kalashnikov, Sharad Mehrotra
TMC
2011
145views more  TMC 2011»
13 years 3 months ago
MAC Layer Throughput Estimation in Impulse-Radio UWB Networks
—The inherent channel characteristics of impulse-based UWB networks affect the MAC layer performance significantly. Most previous studies on evaluating MAC protocols are based o...
Ioannis Broustis, Aggelos Vlavianos, Prashant Kris...
HPCA
2009
IEEE
14 years 9 months ago
Practical off-chip meta-data for temporal memory streaming
Prior research demonstrates that temporal memory streaming and related address-correlating prefetchers improve performance of commercial server workloads though increased memory l...
Thomas F. Wenisch, Michael Ferdman, Anastasia Aila...
SRDS
2005
IEEE
14 years 2 months ago
Agile Store: Experience with Quorum-Based Data Replication Techniques for Adaptive Byzantine Fault Tolerance
Quorum protocols offer several benefits when used to maintain replicated data but techniques for reducing overheads associated with them have not been explored in detail. It is d...
Lei Kong, Deepak J. Manohar, Mustaque Ahamad, Arun...
CCS
2010
ACM
13 years 8 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov