Sciweavers

415 search results - page 51 / 83
» time 1994
Sort
View
SIGMOD
1994
ACM
175views Database» more  SIGMOD 1994»
14 years 1 months ago
Sleepers and Workaholics: Caching Strategies in Mobile Environments
In the mobile wireless computing environment of the future, a large number of users, equipped with low-powered palmtop machines, will query databases over wireless communication ch...
Daniel Barbará, Tomasz Imielinski
STOC
1994
ACM
134views Algorithms» more  STOC 1994»
14 years 1 months ago
A coding theorem for distributed computation
Shannon's Coding Theorem shows that in order to reliably transmit a message of T bits over a noisy communication channel, only a constant slowdown factor is necessary in the ...
Sridhar Rajagopalan, Leonard J. Schulman
SBP
2011
Springer
13 years 4 months ago
A Longitudinal View of the Relationship Between Social Marginalization and Obesity
We use 3 Waves of the Add Health data collected between 1994 and 2002 to conduct a longitudinal study of the relationship between social marginalization and the weight status of ad...
Andrea Apolloni, Achla Marathe, Zhengzheng Pan
ICCAD
1994
IEEE
117views Hardware» more  ICCAD 1994»
14 years 1 months ago
Optimization of critical paths in circuits with level-sensitive latches
A simple extension of the critical path method is presented which allows more accurate optimization of circuits with level-sensitive latches. The extended formulation provides a s...
Timothy M. Burks, Karem A. Sakallah
FSE
1994
Springer
134views Cryptology» more  FSE 1994»
14 years 1 months ago
Cryptanalysis of McGuffin
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to differential cryptanalysis as the DES. 1 McGuffin Schneier and...
Vincent Rijmen, Bart Preneel