Sciweavers

10625 search results - page 2106 / 2125
» Supporting delay-intolerant applications
Sort
View
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
14 years 20 days ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
CSB
2003
IEEE
14 years 20 days ago
An SVM-based Algorithm for Identification of Photosynthesis-specific Genome Features
This paper presents a novel algorithm for identification and functional characterization of “key” genome features responsible for a particular biochemical process of interest....
Gong-Xin Yu, George Ostrouchov, Al Geist, Nagiza F...
FOCS
2003
IEEE
14 years 20 days ago
Approximation Algorithms for Asymmetric TSP by Decomposing Directed Regular Multigraphs
A directed multigraph is said to be d-regular if the indegree and outdegree of every vertex is exactly d. By Hall’s theorem one can represent such a multigraph as a combination ...
Haim Kaplan, Moshe Lewenstein, Nira Shafrir, Maxim...
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 20 days ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
14 years 20 days ago
A Single Buyer-Single Supplier Bargaining Problem with Asymmetric Information - Theoretical Approach and Software Implementation
This paper is focused on the coordination of order and production policy between buyers and suppliers in supply chains. When a buyer and a supplier of an item work independently, ...
Eric Sucky
« Prev « First page 2106 / 2125 Last » Next »