Sciweavers

333 search results - page 35 / 67
» Computation with Absolutely No Space Overhead
Sort
View
AIPS
2006
13 years 11 months ago
Resource Contention Metrics for Oversubscribed Scheduling Problems
We investigate a task insertion heuristic for oversubscribed scheduling problems, max-availability, that uses a simple estimate of resource contention to assign tasks to intervals...
Laurence A. Kramer, Stephen F. Smith
RCIS
2010
13 years 7 months ago
Using Software Metrics in the Evaluation of a Conceptual Component Model
Every interactive system has a functional part and an interactive part. However the software engineering and the human-computer-interaction communities work separately in terms of ...
Eric Ceret, Sophie Dupuy-Chessa, Guillaume Godet-B...
INFOCOM
2012
IEEE
12 years 10 days ago
On detecting pollution attacks in inter-session network coding
Abstract—Dealing with pollution attacks in inter-session network coding is challenging due to the fact that sources, in addition to intermediate nodes, can be malicious. In this ...
Anh Le, Athina Markopoulou
ICCD
2006
IEEE
128views Hardware» more  ICCD 2006»
14 years 6 months ago
Polaris: A System-Level Roadmap for On-Chip Interconnection Networks
Technology trends are driving parallel on-chip architectures in the form of multi-processor systems-on-a-chip (MPSoCs) and chip multi-processors (CMPs). In these systems the incre...
Vassos Soteriou, Noel Eisley, Hangsheng Wang, Bin ...
IMA
2007
Springer
97views Cryptology» more  IMA 2007»
14 years 4 months ago
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
Non-linear cryptanalysis is a natural extension to Matsui’s linear cryptanalitic techniques in which linear approximations are replaced by nonlinear expressions. Non-linear appro...
Juan M. Estévez-Tapiador, John A. Clark, Ju...