Sciweavers

4922 search results - page 708 / 985
» Internet time out
Sort
View
TCOS
2010
15 years 3 months ago
Constructing Two-Dimensional Voronoi Diagrams via Divide-and-Conquer of Envelopes in Space
We present a general framework for computing two-dimensional Voronoi diagrams of different classes of sites under various distance functions. Most diagrams mentioned in the paper ...
Ophir Setter, Micha Sharir, Dan Halperin
TPDS
2010
135views more  TPDS 2010»
15 years 3 months ago
Maximizing Service Reliability in Distributed Computing Systems with Random Node Failures: Theory and Implementation
—In distributed computing systems (DCSs) where server nodes can fail permanently with nonzero probability, the system performance can be assessed by means of the service reliabil...
Jorge E. Pezoa, Sagar Dhakal, Majeed M. Hayat
VTC
2010
IEEE
167views Communications» more  VTC 2010»
15 years 3 months ago
Pseudo Random Network Coding Design for IEEE 802.16m Enhanced Multicast and Broadcast Service
—Applying network coding on broadcasting service is known to reduce times of transmission in the process of recovering the loss packets. In previous design, coding coefficients ...
Cheng-Chih Chao, Ching-Chun Chou, Hung-Yu Wei
WG
2010
Springer
15 years 3 months ago
Generalized Graph Clustering: Recognizing (p, q)-Cluster Graphs
Cluster Editing is a classical graph theoretic approach to tackle the problem of data set clustering: it consists of modifying a similarity graph into a disjoint union of cliques,...
Pinar Heggernes, Daniel Lokshtanov, Jesper Nederlo...
124
Voted
ASIACRYPT
2010
Springer
15 years 2 months ago
Rotational Rebound Attacks on Reduced Skein
Abstract. In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competitio...
Dmitry Khovratovich, Ivica Nikolic, Christian Rech...