Sciweavers

5128 search results - page 15 / 1026
» When Abstraction Fails
Sort
View
ICCCN
2007
IEEE
14 years 1 months ago
Node-Replacement Policies to Maintain Threshold-Coverage in Wireless Sensor Networks
Abstract— With the rapid deployment of wireless sensor networks, there are several new sensing applications with specific requirements. Specifically, target tracking applicatio...
Sachin Parikh, Vinod Vokkarane, Liudong Xing, Daya...
AAECC
2007
Springer
111views Algorithms» more  AAECC 2007»
13 years 7 months ago
When cache blocking of sparse matrix vector multiply works and why
Abstract. We present new performance models and a new, more compact data structure for cache blocking when applied to the sparse matrixvector multiply (SpM×V) operation, y ← y +...
Rajesh Nishtala, Richard W. Vuduc, James Demmel, K...
COGSCI
2010
80views more  COGSCI 2010»
13 years 7 months ago
Gesturing Saves Cognitive Resources When Talking About Nonpresent Objects
In numerous experimental contexts, gesturing has been shown to lighten a speaker's cognitive load. However, in all of these experimental paradigms, the gestures have been dir...
Raedy Ping, Susan Goldin-Meadow
GLOBECOM
2006
IEEE
14 years 1 months ago
Relay Selection in Multi-Node Cooperative Communications: When to Cooperate and Whom to Cooperate with?
Abstract— In this paper, we propose a new cooperative communication protocol, which achieves high bandwidth efficiency while guaranteeing full diversity order. The proposed sche...
Ahmed S. Ibrahim, Ahmed K. Sadek, Weifeng Su, K. J...
ACISP
2005
Springer
14 years 28 days ago
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity
Abstract. The PCBC block cipher mode of operation has many variants, of which one, due to Meyer and Matyas, dates back over 20 years. Whilst a particularly simple variant of PCBC h...
Chris J. Mitchell