Sciweavers

4266 search results - page 93 / 854
» The container loading problem
Sort
View
PODC
2005
ACM
14 years 3 months ago
Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding
We propose a scheme for building peer-to-peer overlay networks for broadcasting using network coding. The scheme addresses many practical issues such as scalability, robustness, c...
Kamal Jain, László Lovász, Ph...
GI
2005
Springer
14 years 3 months ago
A new approach towards authenticated key agreement schemes for resource-constrained devices
: This paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to gene...
Christian Gorecki, Christian Behrens, Rainer Laur
CAV
2001
Springer
87views Hardware» more  CAV 2001»
14 years 1 months ago
Microarchitecture Verification by Compositional Model Checking
Compositional model checking is used to verify a processor microarchitecture containing most of the features of a modern microprocessor, including branch prediction, speculative ex...
Ranjit Jhala, Kenneth L. McMillan
ISASSCI
2001
13 years 11 months ago
Metadata Driven Data Transformation
The bottleneck of a data warehouse implementation is the ETL (extraction, transformation, and load) process, which carries out the initial population of the data warehouse and its...
Petr Aubrecht, Zdenek Kouba
WSC
1996
13 years 11 months ago
Modeling issues in a shipping system
We describe the application of simulation and statistical analyses to the improvement of a shipping and distribution system supporting a component-fabrication plant and two automo...
Edward J. Williams, Susan Khoubyari