Sciweavers

628 search results - page 111 / 126
» On the Twofish Key Schedule
Sort
View
JLP
2008
134views more  JLP 2008»
13 years 8 months ago
Backwards type analysis of asynchronous method calls
Asynchronous method calls have been proposed to better integrate object orientation with distribution. In the Creol language, asynchronous method calls are combined with so-called...
Einar Broch Johnsen, Ingrid Chieh Yu
JUCS
2008
200views more  JUCS 2008»
13 years 8 months ago
Tabu Search on GPU
: Nowadays Personal Computers (PCs) are often equipped with powerful, multi-core CPU. However, the processing power of the modern PC does not depend only of the processing power of...
Adam Janiak, Wladyslaw A. Janiak, Maciej Lichtenst...
JSAC
2006
152views more  JSAC 2006»
13 years 8 months ago
A Distributed End-to-End Reservation Protocol for IEEE 802.11-Based Wireless Mesh Networks
Abstract--This paper presents an end-to-end reservation protocol for quality-of-service (QoS) support in the medium access control layer of wireless multihop mesh networks. It rese...
E. Carlson, Christian Prehofer, Christian Bettstet...
MAGS
2006
86views more  MAGS 2006»
13 years 7 months ago
A system model for university course timetabling using mobile agents
A mobile multi-agent system is proposed to create solutions for the university course timetabling problem. It is composed of four kinds of agents: (mobile) Course Agents, and (stat...
Yan Yang, Raman Paranjape, Luigi Benedicenti, Nanc...
QUESTA
2006
98views more  QUESTA 2006»
13 years 7 months ago
The discrete-time preemptive repeat identical priority queue
Priority queueing systems come natural when customers with diversified delay requirements have to wait to get service. The customers that cannot tolerate but small delays get serv...
Joris Walraevens, Dieter Fiems, Herwig Bruneel