Sciweavers

1285 search results - page 227 / 257
» Codes for Digital Recorders
Sort
View
DGO
2008
112views Education» more  DGO 2008»
13 years 8 months ago
Relating taxonomies with regulations
Increasingly, taxonomies are being developed for a wide variety of industrial domains and specific applications within those domains. These industry or application specific taxono...
Chin Pang Cheng, Jiayi Pan, Gloria T. Lau, Kincho ...
CSREASAM
2003
13 years 8 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
APLAS
2010
ACM
13 years 7 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
JSAC
2006
180views more  JSAC 2006»
13 years 7 months ago
Adaptive spread-spectrum multicarrier multiple-access over wirelines
Abstract--In this paper, we investigate the dynamic resource allocation adapted to spread-spectrum multicarrier multiple-access (SS-MC-MA) systems in a multiuser power line communi...
Matthieu Crussière, Jean-Yves Baudais, Jean...
SIGMETRICS
2008
ACM
138views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Utility maximization in peer-to-peer systems
In this paper, we study the problem of utility maximization in P2P systems, in which aggregate application-specific utilities are maximized by running distributed algorithms on P2...
Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Ji...