Sciweavers

230 search results - page 45 / 46
» Cryptanalysis of the Quadratic Generator
Sort
View
IANDC
2008
105views more  IANDC 2008»
13 years 7 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
JVCIR
2006
163views more  JVCIR 2006»
13 years 7 months ago
Layered H.264 video transmission with hierarchical QAM
In multimedia communication systems, channel bandwidth and probability of error are the two main limitations that affect the quality of service. Therefore, in applications such as...
Mohammad Mahdi Ghandi, Mohammed Ghanbari
TASE
2008
IEEE
13 years 7 months ago
New Solution Approaches to the General Single- Machine Earliness-Tardiness Problem
This paper addresses the general single-machine earliness-tardiness problem with distinct release dates, due dates, and unit costs. The aim of this research is to obtain an exact n...
Hoksung Yau, Yunpeng Pan, Leyuan Shi
JSC
2007
79views more  JSC 2007»
13 years 7 months ago
Computation of bases of free modules over the Weyl algebras
A well-known result due to J. T. Stafford asserts that a stably free left module M over the Weyl algebras D = An(k) or Bn(k) − where k is a field of characteristic 0 − with ...
Alban Quadrat, Daniel Robertz
SIAMAM
2000
90views more  SIAMAM 2000»
13 years 7 months ago
Local Strong Homogeneity of a Regularized Estimator
This paper deals with regularized pointwise estimation of discrete signals which contain large strongly homogeneous zones, where typically they are constant, or linear, or more gen...
Mila Nikolova