Sciweavers

3717 search results - page 165 / 744
» Representing Multiple Theories
Sort
View
151
Voted
SIAMCOMP
2008
103views more  SIAMCOMP 2008»
15 years 3 months ago
Compression in Finite Fields and Torus-Based Cryptography
Abstract. We present efficient compression algorithms for subgroups of multiplicative groups of finite fields, we use our compression algorithms to construct efficient public key c...
Karl Rubin, Alice Silverberg
112
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 2 months ago
Performance Evaluation of Components Using a Granularity-based Interface Between Real-Time Calculus and Timed Automata
nalysis of a TA modeled component. First, we abstract fine models to work with event streams at coarse granularity. We perform analysis of the component at multiple coarse granular...
Karine Altisen, Yanhong Liu, Matthieu Moy
106
Voted
TIT
2010
76views Education» more  TIT 2010»
14 years 10 months ago
Tighter bounds on the capacity of finite-state channels via Markov set-chains
The theory of Markov set-chains is applied to derive upper and lower bounds on the capacity of finite-state channels that are tighter than the classic bounds by Gallager. The new ...
Jun Chen, Haim H. Permuter, Tsachy Weissman
INFOCOM
2010
IEEE
15 years 2 months ago
Delay Analysis for Cognitive Radio Networks with Random Access: A Fluid Queue View
Abstract—We consider a cognitive radio network where multiple secondary users (SUs) contend for spectrum usage, using random access, over available primary user (PU) channels. Ou...
Shanshan Wang, Junshan Zhang, Lang Tong
110
Voted
NORDICHI
2006
ACM
15 years 9 months ago
Understanding the work of an HCI practitioner
Users should be involved in the development of information technology (IT) artifacts. However, this is challenging, especially in product development context, in which Human Compu...
Netta Iivari