Sciweavers

1207 search results - page 197 / 242
» Towards optimal k-anonymization
Sort
View
CONEXT
2007
ACM
14 years 19 days ago
Practical service provisioning for wireless meshes
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
DAC
2010
ACM
14 years 18 days ago
Cost-aware three-dimensional (3D) many-core multiprocessor design
The emerging three-dimensional integrated circuit (3D IC) is beneficial for various applications from both area and performance perspectives. While the general trend in processor...
Jishen Zhao, Xiangyu Dong, Yuan Xie
EENERGY
2010
14 years 18 days ago
ICT for green: how computers can help us to conserve energy
Information and communication technology (ICT) consumes energy, but is also an important means of conserving energy. Conventionally, it has done so by optimizing the performance o...
Friedemann Mattern, Thorsten Staake, Markus Weiss
HOTOS
2009
IEEE
14 years 16 days ago
FlashVM: Revisiting the Virtual Memory Hierarchy
Flash memory is the largest change to storage in recent history. To date, most research has focused on integrating flash as persistent storage in file systems, with little emphasi...
Mohit Saxena, Michael M. Swift
WCNC
2010
IEEE
14 years 14 days ago
MAC Performance Analysis for Vehicle-to-Infrastructure Communication
—The newly emerged vehicular ad hoc network adopts the contention based IEEE 802.11 DCF as its MAC. While it has been extensively studied in the stationary indoor environment (e....
Tom H. Luan, Xinhua Ling, Xuemin Shen