Abstract— Power dissipation has constrained the performance boosting of modern computer systems in the past decade. Dynamic power management (DPM) has been implemented in many sy...
Kai Huang, Luca Santinelli, Jian-Jia Chen, Lothar ...
Abstract—The pervasiveness of complex communication services and the need for end-users to play a greater role in developing communication services have resulted in the creation ...
Yingbo Wang, Yali Wu, Andrew A. Allen, Barbara Esp...
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Abstract. We describe a proximity query algorithm for the exact minimum distance computation between arbitrarily shaped objects. Special characteristics of the Gilbert-Johnson-Keer...
Marc Gissler, Christian Dornhege, Bernhard Nebel, ...
Abstract. Model Transformations can be used to bridge the gap between design and analysis technical spaces by creating tools that allow a model produced by a designer to be transfo...
Seyyed M. A. Shah, Kyriakos Anastasakis, Behzad Bo...