Sciweavers

2125 search results - page 66 / 425
» Points with Type-2 Operations
Sort
View
CISS
2008
IEEE
14 years 3 months ago
Optimizing wireless networks for heterogeneous spatial loads
—Large-scale wireless networks must be designed such that there are no gaps in coverage. It is also desirable to minimize the number of access points used in order to minimize th...
Balaji Rengarajan, Gustavo de Veciana
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
ECOOP
2005
Springer
14 years 2 months ago
Separation of Concerns with Procedures, Annotations, Advice and Pointcuts
There are numerous mechanisms for separation of concerns at the source code level. Three mechanisms that are the focus of recent attention – metadata annotations, pointcuts and a...
Gregor Kiczales, Mira Mezini
ROCAI
2004
Springer
14 years 2 months ago
ROC Optimisation of Safety Related Systems
Abstract. Many safety related and critical systems warn of potentially dangerous events; for example the Short Term Conflict Alert (STCA) system warns of airspace infractions betw...
Jonathan E. Fieldsend, Richard M. Everson
USENIX
1994
13 years 10 months ago
A Toolkit and Methods for Internet Firewalls
The purpose of an Internet firewall is to provide a point of defense and a controlled and audited access to services, both from within and without an organization
Marcus J. Ranum, Frederick M. Avolio