Sciweavers

2135 search results - page 362 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
FROCOS
2007
Springer
14 years 3 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ISMVL
2010
IEEE
191views Hardware» more  ISMVL 2010»
14 years 2 months ago
Toffoli Gate Implementation Using the Billiard Ball Model
— In this paper we review the Billiard Ball Model (BBM) introduced by Toffoli and Fredkin. The analysis of a previous approach to design reversible networks based on BBM it shown...
Hadi Hosseini, Gerhard W. Dueck
ISCAPDCS
2003
13 years 10 months ago
Efficient Data Allocation for a Cluster of Workstations
The development and use of cluster based computing is increasingly becoming an effective approach for solving high performance computing problems. The trend of moving away from sp...
Ahmed M. Mohamed, Reda A. Ammar, Lester Lipsky
CORR
2010
Springer
163views Education» more  CORR 2010»
13 years 4 months ago
Toward a Push-Scalable Global Internet
Push message delivery, where a client maintains an "always-on" connection with a server in order to be notified of a (asynchronous) message arrival in real-time, is incre...
Sachin Agarwal
ICC
2007
IEEE
129views Communications» more  ICC 2007»
14 years 3 months ago
Time Sharing Policy in Wireless Networks for Variable Rate Transmission
— For most of wireless services with variable rate transmission, both average rate and rate oscillation are important performance metrics. One often needs to decide how much rate...
Xiaolu Zhang, Meixia Tao, Chun Sum Ng