Sciweavers

1220 search results - page 81 / 244
» Dependent classes
Sort
View
ISCAS
2006
IEEE
93views Hardware» more  ISCAS 2006»
14 years 3 months ago
Discontinuity-induced bifurcations in TCP/RED communication algorithms
— In this paper, we describe a simple second-order discrete-time model for the Transmission Control Protocol (TCP) with Random Early Detection (RED) algorithm. The TCP/RED mechan...
Mingjian Liu, A. Marciello, Mario di Bernardo, Lji...
CONTEXT
2005
Springer
14 years 2 months ago
Granularity as a Parameter of Context
Abstract. Spatial and temporal granularity can be understood as parameters of context restricting the set of accessible objects in a context. Starting from the idea that this selec...
Hedda Rahel Schmidtke
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not requir...
Ivan Damgård, Yuval Ishai
W2GIS
2005
Springer
14 years 2 months ago
Towards a Taxonomy of Location Based Services
Location-based services (LBS) constitute an emerging application domain involving spatio-temporal databases. In this paper, i) we propose a classification of LBS, depending on whet...
Kostas Gratsias, Elias Frentzos, Vasilis Delis, Ya...
IWCIA
2004
Springer
14 years 2 months ago
Shape Preserving Sampling and Reconstruction of Grayscale Images
Abstract. The expressiveness of a lot of image analysis algorithms depends on the question whether shape information is preserved during digitization. Most existing approaches to a...
Peer Stelldinger