Sciweavers

875 search results - page 96 / 175
» Extending the CG Model by Simulations
Sort
View
PODC
2010
ACM
15 years 8 months ago
The multiplicative power of consensus numbers
: The Borowsky-Gafni (BG) simulation algorithm is a powerful reduction algorithm that shows that t-resilience of decision tasks can be fully characterized in terms of wait-freedom....
Damien Imbs, Michel Raynal
ISW
2007
Springer
15 years 10 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
ICANN
2003
Springer
15 years 9 months ago
The Interaction of Recurrent Axon Collateral Networks in the Basal Ganglia
We have proposed that the basal ganglia act as the central switching mechanism for the action selection system of the vertebrate brain. Simulation of our functional model of basal ...
Mark D. Humphries, Tony J. Prescott, Kevin N. Gurn...
WSC
2008
15 years 6 months ago
Priority mix planning for cycle time-differentiated semiconductor manufacturing services
Semiconductor fabs often offer manufacturing service of multiple priorities in terms of cycle time-based X-factor targets (XFTs) and fab production must be planned accordingly. Th...
Shi-Chung Chang, Shin-Shyu Su, Ke-Ju Chen
ICPPW
2003
IEEE
15 years 9 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao