Sciweavers

3652 search results - page 365 / 731
» A study of query length
Sort
View
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
15 years 10 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
129
Voted
CPAIOR
2009
Springer
15 years 10 months ago
Reformulating Global Grammar Constraints
An attractive mechanism to specify global constraints in rostering and other domains is via formal languages. For instance, the REGULAR and GRAMMAR constraints specify constraints ...
George Katsirelos, Nina Narodytska, Toby Walsh
119
Voted
IFIP
2009
Springer
15 years 10 months ago
Quantifying the Uncertainty in Measurements for MBAC
Abstract. In Measurement Based Admission Control (MBAC), the decision of accepting or rejecting a new flow is based on measurements of the current traffic situation. An in-depth u...
Anne Nevin, Peder J. Emstad, Yuming Jiang, Guoqian...
SPIRE
2009
Springer
15 years 10 months ago
A Linear-Time Burrows-Wheeler Transform Using Induced Sorting
To compute Burrows-Wheeler Transform (BWT), one usually builds a suffix array (SA) first, and then obtains BWT using SA, which requires much redundant working space. In previous ...
Daisuke Okanohara, Kunihiko Sadakane
DATE
2008
IEEE
168views Hardware» more  DATE 2008»
15 years 10 months ago
A methodology for improving software design lifecycle in embedded control systems
Control design and real-time implementation are usually performed in isolation. The effects of the computer implementation on control system performance are still evaluated on the...
Mohamed El Mongi Ben Gaid, Rémy Kocik, Yves...