Sciweavers

657 search results - page 24 / 132
» A Version Numbering Scheme with a Useful Lexicographical Ord...
Sort
View
ICPP
1995
IEEE
14 years 1 days ago
Multilevel Graph Partitioning Schemes
– In this paper we present experiments with a class of graph partitioning algorithms that reduce the size of the graph by collapsing vertices and edges, partition the smaller gra...
George Karypis, Vipin Kumar
FSE
2001
Springer
85views Cryptology» more  FSE 2001»
14 years 1 months ago
New Results on the Pseudorandomness of Some Blockcipher Constructions
In this paper, we describe new results on the security, in the Luby-Rackoff paradigm, of two modified Feistel constructions, namely the L-scheme, a construction used at various l...
Henri Gilbert, Marine Minier
WCNC
2008
IEEE
14 years 2 months ago
Throughput and Delay Performance Analysis of Packet Aggregation Scheme for PRMA
—Packet reservation multiple access (PRMA) protocol is an implicit reservation MAC protocol. It is initially designed for voice packets in the cellular networks [2], [3] but it is...
Qi Zhang, Villy Bæk Iversen, Frank H. P. Fit...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 11 days ago
Flow Digest: A State Replication Scheme for Stateful High Availability Cluster
Stateful tracking is a popular technique in firewall filtering and state replication is used to provide reliable connectivity. This paper proposes a new approach for improving exis...
Yi-Hsuan Feng, Nen-Fu Huang, Rong-Tai Liu, Meng-Hu...
CORR
2008
Springer
166views Education» more  CORR 2008»
13 years 8 months ago
Information-Theoretically Secure Voting Without an Honest Majority
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities...
Anne Broadbent, Alain Tapp