Sciweavers

141 search results - page 18 / 29
» Generating statechart designs from scenarios
Sort
View
INDOCRYPT
2005
Springer
14 years 3 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 4 months ago
On the Accuracy of an Indoor Location-sensing Technique Suitable for Impulse Radio Networks
An impulse radio indoor mapping and positioning technique has been proposed. This technique enables impulse radios to use the times of arrival (TOAs) of dominant echoes from the su...
Wenyu Guo, Nicholas P. Filer
P2PKM
2004
13 years 11 months ago
RDFGrowth, a P2P annotation exchange algorithm for scalable Semantic Web applications
We present RDFGrowth, an algorithm that addresses a specific yet important scenario: large scale, end user targeted, metadata exchange P2P applications. In this scenario, peers per...
Giovanni Tummarello, Christian Morbidoni, Joackin ...
ODBIS
2007
Springer
150views Database» more  ODBIS 2007»
14 years 4 months ago
An Effective SPARQL Support over Relational Databases
Supporting SPARQL queries over relational databases becomes an active topic recently. However, it has not received enough consideration when SPARQL queries include restrictions on...
Jing Lu, Feng Cao, Li Ma, Yong Yu, Yue Pan
USENIX
2008
14 years 4 days ago
Cutting Corners: Workbench Automation for Server Benchmarking
A common approach to benchmarking a server is to measure its behavior under load from a workload generator. Often a set of such experiments is required-perhaps with different serv...
Piyush Shivam, Varun Marupadi, Jeffrey S. Chase, T...