Sciweavers

698 search results - page 38 / 140
» Evaluating Key Statements Analysis
Sort
View
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
13 years 8 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
VTC
2006
IEEE
14 years 3 months ago
Mellin Transform Based Performance Analysis of Fast Frequency Hopping Using Product Combining
— In this contribution, we analyze the bit error rate (BER) performance of fast frequency hopping (FFH) assisted M-ary frequency shift keying (MFSK) using product combining. Prod...
Sohail Ahmed, Lie-Liang Yang, Lajos Hanzo
NETWORKING
2004
13 years 11 months ago
Analysis of a Finite Number of Deflections in Fully and Uniformly Loaded Regular Networks
This paper presents an analytical methodology to obtain steady state throughput of a uniformly and fully loaded regular network. The network operates using deflection routing under...
Ireneusz Szczesniak
JUCS
2008
186views more  JUCS 2008»
13 years 10 months ago
Model Interpreter Frameworks: A Foundation for the Analysis of Domain-Specific Software Architectures
: Prediction of the quality attributes of software architectures requires technologies that enable the application of analytic theories to component models. However, available anal...
George Edwards, Chiyoung Seo, Nenad Medvidovic
JCO
2010
70views more  JCO 2010»
13 years 8 months ago
Worst-case analysis for on-line service policies
This paper considers an on-line scheduling problem occurred in a service system with two classes (normal and special) of customers and two types (dedicated and flexible) of serve...
Zhenbo Wang, Wenxun Xing