Sciweavers

6202 search results - page 1072 / 1241
» Without Loss of Generality
Sort
View
WISEC
2010
ACM
15 years 9 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
WOSP
2010
ACM
15 years 9 months ago
Quantifying load imbalance on virtualized enterprise servers
Virtualization has been shown to be an attractive path to increase overall system resource utilization. The use of live virtual machine (VM) migration has enabled more effective ...
Emmanuel Arzuaga, David R. Kaeli
GLVLSI
2003
IEEE
146views VLSI» more  GLVLSI 2003»
15 years 9 months ago
A practical CAD technique for reducing power/ground noise in DSM circuits
One of the fundamental problems in Deep Sub Micron (DSM) circuits is Simultaneous Switching Noise (SSN), which causes voltage fluctuations in the circuit power/ground networks. In...
Arindam Mukherjee, Krishna Reddy Dusety, Rajsaktis...
ICDCSW
2003
IEEE
15 years 9 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
ICRA
2003
IEEE
165views Robotics» more  ICRA 2003»
15 years 9 months ago
Multi-robot task-allocation through vacancy chains
Existing task allocation algorithms generally do not consider the effects of task interaction, such as interference, but instead assume that tasks are independent. That assumptio...
Torbjørn S. Dahl, Maja J. Mataric, Gaurav S...
« Prev « First page 1072 / 1241 Last » Next »