Sciweavers

2687 search results - page 417 / 538
» On the Conversion between Number Systems
Sort
View
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
14 years 1 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
MICRO
1999
IEEE
108views Hardware» more  MICRO 1999»
14 years 1 months ago
Exploiting ILP in Page-based Intelligent Memory
This study compares the speed, area, and power of di erent implementations of Active Pages OCS98], an intelligent memory system which helps bridge the growing gap between processo...
Mark Oskin, Justin Hensley, Diana Keen, Frederic T...
SP
1999
IEEE
125views Security Privacy» more  SP 1999»
14 years 1 months ago
A Multi-Threading Architecture for Multilevel Secure Transaction Processing
A TCB and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment is presented. Our design ...
Haruna R. Isa, William R. Shockley, Cynthia E. Irv...
ICRA
1998
IEEE
154views Robotics» more  ICRA 1998»
14 years 1 months ago
Environmental Complexity Control for Vision-Based Learning Mobile Robot
This paper discusses how a robot can develop its state vector according to the complexity of the interactions with its environment. A method for controlling the complexity is prop...
Eiji Uchibe, Minoru Asada, Koh Hosoda
IPPS
1998
IEEE
14 years 1 months ago
Network-Aware Distributed Computing: A Case Study
Abstract. The development of network-aware applications, i.e. applications that dynamically adapt to network conditions, has had some success in the domain of multimedia applicatio...
Hongsuda Tangmunarunkit, Peter Steenkiste