Sciweavers

176 search results - page 16 / 36
» Reducing the number of counters needed for integer multiplic...
Sort
View
WAOA
2005
Springer
92views Algorithms» more  WAOA 2005»
14 years 1 months ago
The Conference Call Search Problem in Wireless Networks
Cellular telephony systems, where locations of mobile users are unknown at some times, are becoming more common. In such systems, mobile users are roaming in a zone and a user repo...
Leah Epstein, Asaf Levin
VALUETOOLS
2006
ACM
142views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
M/M/C queues with Markov modulated service processes
Motivated by the need to study traffic flow affected by incidents we consider M/M/C queueing system where servers operate in a Markovian environment. When a traffic incident hap...
Melike Baykal-Gursoy, Zhe Duan
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 10 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
AI
2011
Springer
13 years 2 months ago
Expressive markets for donating to charities
When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as a bargaining chip to induce other parties interested in the charity to donate ...
Vincent Conitzer, Tuomas Sandholm
PCI
2005
Springer
14 years 1 months ago
Reliable Transmission Using Intermediate Sink or Source Nodes in Sensor Networks
The main resarch in sensor networks has been focused on minimizing power consumption of sensors to maximize network life time. In some critical applications, however, the most impo...
Bo-Hyung Lee, Hyung-Wook Yoon, Jongho Park, Min Yo...