Sciweavers

248 search results - page 3 / 50
» A non-holonomic systems approach to special function identit...
Sort
View
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
14 years 1 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
DAGSTUHL
2007
13 years 9 months ago
Lifetime Extension of Higher Class UHF RFID Tags using special Power Management Techniques and Energy Harvesting Devices
Abstract. Enhanced RFID tag technology especially in the UHF frequency range provides extended functionality like high operating range and sensing and monitoring capabilities. Such...
Alex Janek, Christian Steger, Josef Preishuber-Pfl...
QUESTA
2006
98views more  QUESTA 2006»
13 years 7 months ago
The discrete-time preemptive repeat identical priority queue
Priority queueing systems come natural when customers with diversified delay requirements have to wait to get service. The customers that cannot tolerate but small delays get serv...
Joris Walraevens, Dieter Fiems, Herwig Bruneel
APLAS
2004
ACM
14 years 28 days ago
Protocol Specialization
Abstract. In component-based programming, the programmer assembles applications from prefabricated components. The assembly process has two main steps: adapting a component by twea...
Matthias Neubauer, Peter Thiemann
DOLAP
2005
ACM
13 years 9 months ago
Modeling, querying and reasoning about OLAP databases: a functional approach
We propose a new functional framework for modeling, querying and reasoning about OLAP databases. The framework represents data (data cubes and dimensional hierarchies) and queryin...
Ken Q. Pu