Sciweavers

200 search results - page 37 / 40
» Tyrolean Termination Tool
Sort
View
ESOP
2009
Springer
14 years 2 months ago
All Secrets Great and Small
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
Delphine Demange, David Sands
GLOBECOM
2008
IEEE
14 years 1 months ago
Impact of Mobility on the Behavior of Interference in Cellular Wireless Networks
In this study, the impact of mobility is investigated in low-speed environments such as femtocells and picocells for wireless networks. Given that there is interference on the upl...
Serhan Yarkan, Amine Maaref, Koon Hoo Teo, Hü...
VTC
2008
IEEE
14 years 1 months ago
Resource Allocation and Control Signaling in the WINNER Flexible MAC Concept
—The EU WINNER projects have studied OFDM-based packet data systems beyond 3G that use adaptivity on all timescales to obtain high flexibility and performance. The adaptive trans...
Mikael Sternad, Tommy Svensson, Martin Döttli...
EUROCRYPT
2005
Springer
14 years 1 months ago
Floating-Point LLL Revisited
The Lenstra-Lenstra-Lov´asz lattice basis reduction algorithm (LLL or L3 ) is a very popular tool in public-key cryptanalysis and in many other fields. Given an integer d-dimensi...
Phong Q. Nguyen, Damien Stehlé
MM
2004
ACM
130views Multimedia» more  MM 2004»
14 years 27 days ago
An approach to interactive media system for mobile devices
The interactive system which interacts human with computer has been recognized as one direction of computer development for a long time. For example, in cinema, a person gets info...
Eun-Seok Ryu, Chuck Yoo