Sciweavers

7112 search results - page 1218 / 1423
» Power in normative systems
Sort
View
EATIS
2007
ACM
14 years 1 months ago
Application layer multicast techniques in grid environments
Resource and service discovery, data transfer or replica management, are some examples of basic operations of a grid which can gain efficiency by using multicast transmission tech...
Rafael Moreno-Vozmediano
ERLANG
2007
ACM
14 years 1 months ago
Extended process registry for Erlang
The built-in process registry has proven to be an extremely useful feature of the Erlang language. It makes it easy to provide named services, which can be reached without knowing...
Ulf Wiger
ESTIMEDIA
2007
Springer
14 years 1 months ago
Still Image Processing on Coarse-Grained Reconfigurable Array Architectures
Due to the increasing demands on efficiency, performance and flexibility reconfigurable computational architectures are very promising candidates in embedded systems design. Recent...
Matthias Hartmann, Vasileios (Vassilis) Pantazis, ...
RTA
2010
Springer
14 years 1 months ago
Certified Subterm Criterion and Certified Usable Rules
Abstract. In this paper we present our formalization of two important termination techniques for term rewrite systems: the subterm criterion and the reduction pair processor in com...
Christian Sternagel, René Thiemann
EUROCRYPT
2007
Springer
14 years 1 months ago
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
Abstract. We introduce a notion of instance-dependent verifiable random functions (InstD-VRFs for short). Informally, an InstD-VRF is, in some sense, a verifiable random function [...
Yi Deng, Dongdai Lin
« Prev « First page 1218 / 1423 Last » Next »