Sciweavers

1822 search results - page 28 / 365
» The Method of Assigning Incidences
Sort
View
CCS
2006
ACM
14 years 1 months ago
Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Fe...
ASPDAC
2001
ACM
137views Hardware» more  ASPDAC 2001»
14 years 1 months ago
Optimized address assignment for DSPs with SIMD memory accesses
This paper deals with address assignment in code generation for digital signal processors (DSPs) with SIMD (single instruction multiple data) memory accesses. In these processors ...
Markus Lorenz, David Koffmann, Steven Bashford, Ra...
ISAAC
2004
Springer
103views Algorithms» more  ISAAC 2004»
14 years 3 months ago
Structural Similarity in Graphs (A Relaxation Approach for Role Assignment)
Standard methods for role assignment partition the vertex set of a graph in such a way that vertices in the same class can be considered to have equivalent roles in the graph. Seve...
Ulrik Brandes, Jürgen Lerner
ICRA
2008
IEEE
131views Robotics» more  ICRA 2008»
14 years 4 months ago
Target assignment for integrated search and tracking by active robot networks
Abstract—This paper presents a new task assignment algorithm that integrates area search and target tracking. A new tracking metric is derived that encodes the ability of each ro...
Eric W. Frew, Jack Elston
RTSS
2008
IEEE
14 years 4 months ago
Delay-Aware Period Assignment in Control Systems
We consider the problem of optimal static period assignment for multiple independent control tasks executing on the same CPU. Previous works have assumed that the control performa...
Enrico Bini, Anton Cervin