Sciweavers

1534 search results - page 261 / 307
» Error Reporting Logic
Sort
View
CORR
2006
Springer
71views Education» more  CORR 2006»
13 years 10 months ago
Wreath Products in Stream Cipher Design
The paper develops a novel approach to stream cipher design: Both the state update function and the output function of the corresponding pseudorandom generators are compositions of...
Vladimir Anashin
GIS
2006
ACM
13 years 10 months ago
Qualitative polyline similarity testing with applications to query-by-sketch, indexing and classification
We present an algorithm for polyline (and polygon) similarity testing that is based on the double-cross formalism. To determine the degree of similarity between two polylines, the...
Bart Kuijpers, Bart Moelans, Nico Van de Weghe
IJOE
2008
120views more  IJOE 2008»
13 years 10 months ago
Application of the Control Validation to the D.E.S. Teaching
Objectives of Automation courses are knowledge and know-how transfer to students. It is important for learner to control locally or remotely real systems composed of many sensors a...
Pascale Marange, François Gellot, Bernard R...
CN
2007
148views more  CN 2007»
13 years 10 months ago
A rigorous approach to orchestrating grid services
Although conceived for web services, it is shown how BPEL (Business Process Execution Language) can be used to orchestrate a collection of grid services. This is achieved using th...
Kenneth J. Turner, Koon Leai Larry Tan
IJCSA
2006
95views more  IJCSA 2006»
13 years 10 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan