Sciweavers

1268 search results - page 225 / 254
» Direct Translation Model 2
Sort
View
CCS
2010
ACM
13 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
JSAC
2011
107views more  JSAC 2011»
13 years 4 months ago
Joint Network Capacity Region for Cognitive Networks Heterogeneous Environments and RF-Environment Awareness
In this paper, we characterize the joint network capacity region for a licensed broadcast (primary) and ad hoc cognitive (secondary) network in a heterogeneous environment, includ...
Yuchul Kim, Gustavo de Veciana
ICDE
2006
IEEE
169views Database» more  ICDE 2006»
14 years 11 months ago
Making Designer Schemas with Colors
XML schema design has two opposing goals: elimination of update anomalies requires that the schema be as normalized as possible; yet higher query performance and simpler query exp...
Nuwee Wiwatwattana, H. V. Jagadish, Laks V. S. Lak...
EMSOFT
2007
Springer
14 years 3 months ago
Loosely time-triggered architectures based on communication-by-sampling
We address the problem of mapping a set of processes which communicate synchronously on a distributed platform. The Time Triggered Architecture (TTA) proposed by Kopetz for the co...
Albert Benveniste, Paul Caspi, Marco Di Natale, Cl...
INFOCOM
2006
IEEE
14 years 3 months ago
QoS, Properties and Views to Achieve Dynamic Adaptivity
— This paper presents our work in the context of the Adaptive Resource Management (ARM) internal research project at the University of Milano-Bicocca, Italy. The project addresse...
Stefano Mussino, Mario Riva