Sciweavers

10891 search results - page 2001 / 2179
» Combining Model Reductions
Sort
View
FOCS
2008
IEEE
14 years 5 months ago
k-Wise Independent Random Graphs
We study the k-wise independent relaxation of the usual model G(N, p) of random graphs where, as in this model, N labeled vertices are fixed and each edge is drawn with probabili...
Noga Alon, Asaf Nussboim
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
14 years 5 months ago
The Futures of EU-Based eGovernment: A Scenario-Based Exploration
The future of eGovernment is very uncertain and requires to be approached by depicting different scenario in which a wide range of contextual factors, such as social, cultural, in...
Patrick van der Duin, Noor Huijboom
INFOCOM
2007
IEEE
14 years 5 months ago
Service Charge and Energy-Aware Vertical Handoff in Integrated IEEE 802.16e/802.11 Networks
Abstract— This paper considers two issues arising in an integrated IEEE 802.16e/802.11 network: 1) finding a possible network, which mobile station (MSTA) can switch to, and 2) ...
Youngkyu Choi, Sunghyun Choi
GI
2007
Springer
14 years 4 months ago
Achieving Semantic Interoperability By Using Complex Event Processing Technology
: State-of-the-art interoperability between heterogeneous systems on a technical level builds on services oriented architectures (SOA) for a given problem space. Semantics can be i...
Margarete Donovang-Kuhlisch
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 4 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
« Prev « First page 2001 / 2179 Last » Next »