Sciweavers

438 search results - page 58 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
SPAA
1996
ACM
13 years 11 months ago
BSP vs LogP
A quantitative comparison of the BSP and LogP models of parallel computation is developed. We concentrate on a variant of LogP that disallows the so-called stalling behavior, alth...
Gianfranco Bilardi, Kieran T. Herley, Andrea Pietr...
ICWE
2004
Springer
14 years 1 months ago
A Framework for the Simulation of Web Applications
Abstract. In recent years numerous Web application modeling languages have been developed and others improved. There has, however, been little research on how these languages may b...
Pedro Peixoto, K. K. Fung, David Lowe
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
CSCW
2011
ACM
13 years 2 months ago
Supporting air traffic control collaboration with a TableTop system
Collaboration is key to safety and efficiency in Air Traffic Control. Legacy paper-based systems enable seamless and non-verbal collaboration, but trends in new software and hardw...
Stéphane Conversy, Hélène Gas...
MTDT
2003
IEEE
164views Hardware» more  MTDT 2003»
14 years 27 days ago
Applying Defect-Based Test to Embedded Memories in a COT Model
ct Defect-based testing for digital logic concentrates primarily on methods of test application, including for example at-speed structural tests and IDDQ testing. In contrast, defe...
Robert C. Aitken