Sciweavers

537 search results - page 45 / 108
» A Call to Regularity
Sort
View
ACNS
2008
Springer
121views Cryptology» more  ACNS 2008»
14 years 2 months ago
Anonymity in Transferable E-cash
Regular cash systems provide both the anonymity of users and the transferability of coins. In this paper, we study the anonymity properties of transferable e-cash. We define two n...
Sébastien Canard, Aline Gouget
ICC
2007
IEEE
170views Communications» more  ICC 2007»
14 years 2 months ago
Optimal Bandwidth Provision at WiMAX MAC Service Access Point on Uplink Direction
—In this paper, the IEEE 802.16 protocol is investigated with respect to the bandwidth provision problem arising at the Medium Access Control (MAC) layer. The aim is to optimally...
Mario Marchese, Maurizio Mongelli
BROADNETS
2006
IEEE
14 years 1 months ago
Design and Dimensioning of a Novel composite-star WDM Network with TDM Channel Partitioning
— This paper presents the design and dimensioning optimization of a novel optical network structure, called the Petaweb, having a total capacity of several Pb/s (1015 bit/s). Its...
Stefano Secci, Brunilde Sansò
ICMCS
2006
IEEE
92views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Case for Internet Streaming via Web Servers
Hosting Internet streaming services has its unique challenges. Aiming at making Internet streaming services be widely and easily adopted in practice, in this paper, we have design...
Songqing Chen, Bo Shen, Wai-tian Tan, Susie Wee, X...
ACMSE
2006
ACM
14 years 1 months ago
Inductive bases and their application to searches for minimal unary NFAs
Classic results in the theory of regular languages show that the problem of converting an NFA (nondeterministic finite automaton) into a minimal equivalent NFA is NP-hard, even f...
Geoffrey Smith