Sciweavers

4345 search results - page 765 / 869
» Temporal Constraint Networks
Sort
View
118
Voted
ECAI
2000
Springer
15 years 7 months ago
A Property of Path Inverse Consistency Leading to an Optimal PIC Algorithm
Abstract. In constraint networks, the efficiency of a search algorithm is strongly related to the local consistency maintained during search. For a long time, it has been consider...
Romuald Debruyne
121
Voted
MOBIDE
1999
ACM
15 years 7 months ago
Data Partitioning for Disconnected Client Server Databases
The use of mobile computers is gaining popularity. The number of users with laptops and notebooks is increasing and this trend is likely to continue in the future where the number...
Shirish Hemant Phatak, B. R. Badrinath
101
Voted
NDSS
1998
IEEE
15 years 7 months ago
Efficient Protocols for Signing Routing Messages
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digitalsi...
Kan Zhang
131
Voted
MM
1993
ACM
113views Multimedia» more  MM 1993»
15 years 6 months ago
The Vidboard: A Video Capture and Processing Peripheral for a Distributed Multimedia System
This paper describes a stand-alone network-based video capture and processing peripheral (the Vidboard) for a distributed multimedia system centered around a gigabit-per-second As...
Joel F. Adam, David L. Tennenhouse
138
Voted
ICDCS
1992
IEEE
15 years 6 months ago
End-to-End Scheduling to Meet Deadlines in Distributed Systems
In a distributed system or communication network tasks may need to be executed on more than one processor. For time-critical tasks, the timing constraints are typically given as e...
Riccardo Bettati, Jane W.-S. Liu