Sciweavers

393 search results - page 67 / 79
» The LCA Problem Revisited
Sort
View
ICCS
2005
Springer
14 years 4 months ago
Generating Parallel Algorithms for Cluster and Grid Computing
We revisit and use the dependence transformation method to generate parallel algorithms suitable for cluster and grid computing. We illustrate this method in two applications: to o...
Ulisses Kendi Hayashida, Kunio Okuda, Jairo Panett...
NIME
2005
Springer
164views Music» more  NIME 2005»
14 years 4 months ago
Wireless Dance Control: PAIR and WISEAR
WISEAR (Wireless Sensor Array) is a Linux based Embeddedx86 TS- 5600 SBC (Single Board Computer) specifically configured for use with music, dance and video performance technologi...
Peter Swendsen, David Topper
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
14 years 4 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
ICTAI
2003
IEEE
14 years 4 months ago
Eliminating Redundancies in SAT Search Trees
Conflict analysis is a powerful paradigm of backtrack search algorithms, in particular for solving satisfiability problems arising from practical applications. Accordingly, most...
Richard Ostrowski, Bertrand Mazure, Lakhdar Sais, ...
INFOCOM
2003
IEEE
14 years 4 months ago
cing: Measuring Network-Internal Delays using only Existing Infrastructure
Abstract— Several techniques have been proposed for measuring network-internal delays. However, those that rely on router responses have questionable performance, and all propose...
Kostas G. Anagnostakis, Michael Greenwald, Raphael...