Sciweavers

3629 search results - page 722 / 726
» A Network Memory Architecture Model and Performance Analysis
Sort
View
FSTTCS
2003
Springer
14 years 25 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
MM
2009
ACM
195views Multimedia» more  MM 2009»
14 years 2 months ago
The effectiveness of intelligent scheduling for multicast video-on-demand
As more and more video content is made available and accessed on-demand, content and service providers face challenges of scale. Today’s delivery mechanisms, especially unicast,...
Vaneet Aggarwal, A. Robert Calderbank, Vijay Gopal...
EMMCVPR
2003
Springer
14 years 26 days ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
BMCBI
2007
131views more  BMCBI 2007»
13 years 7 months ago
An improved method for identifying functionally linked proteins using phylogenetic profiles
Background: Phylogenetic profiles record the occurrence of homologs of genes across fully sequenced organisms. Proteins with similar profiles are typically components of protein c...
Shawn Cokus, Sayaka Mizutani, Matteo Pellegrini
IJES
2006
110views more  IJES 2006»
13 years 7 months ago
Partitioning bin-packing algorithms for distributed real-time systems
Embedded real-time systems must satisfy not only logical functional requirements but also para-functional properties such as timeliness, Quality of Service (QoS) and reliability. W...
Dionisio de Niz, Raj Rajkumar