Sciweavers

729 search results - page 79 / 146
» And Or Hierarchies and Round Abstraction
Sort
View
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
14 years 4 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
ICALP
2009
Springer
14 years 4 months ago
Qualitative Concurrent Stochastic Games with Imperfect Information
Abstract. We study a model of games that combines concurrency, imperfect information and stochastic aspects. Those are finite states games in which, at each round, the two players...
Vincent Gripon, Olivier Serre
APPROX
2009
Springer
99views Algorithms» more  APPROX 2009»
14 years 4 months ago
Resource Minimization Job Scheduling
Abstract. Given a set J of jobs, where each job j is associated with release date rj, deadline dj and processing time pj, our goal is to schedule all jobs using the minimum possibl...
Julia Chuzhoy, Paolo Codenotti
VTC
2008
IEEE
142views Communications» more  VTC 2008»
14 years 4 months ago
Fairness Assessment of the Adaptive Token Bank Fair Queuing Scheduling Algorithm
Abstract—Adaptive Token Bank Fair Queuing (ATBFQ) algorithm has been proposed as a cross-layer scheduling technique for 4G wireless systems recently. This algorithm takes higher ...
Feroz A. Bokhari, Halim Yanikomeroglu, William K. ...
VTC
2008
IEEE
135views Communications» more  VTC 2008»
14 years 4 months ago
MACA-MN: A MACA-Based MAC Protocol for Underwater Acoustic Networks with Packet Train for Multiple Neighbors
Abstract— Unlike the terrestrial wireless networks that utilize the radio channel, underwater networks use the acoustic channel, which poses research challenges in the medium acc...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua