Sciweavers

525 search results - page 52 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Lessons Learned: A Security Analysis of the Internet Chess Club
The Internet Chess Club (ICC) is a popular online chess server with more than 30,000 members worldwide including various celebrities and the best chess players in the world. Altho...
John Black, Martin Cochran, Martin Ryan Gardner
MYCRYPT
2005
Springer
189views Cryptology» more  MYCRYPT 2005»
14 years 2 months ago
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
In this paper we produce a practical and efficient algorithm to find a decomposition of type n = kˆ i=1 2si 3ti , si, ti ∈ N ∪ {0} with k ≤   c + o(1) ¡ log n log log n ....
Mathieu Ciet, Francesco Sica

Lecture Notes
742views
15 years 7 months ago
Computer Systems Analysis
Comparing systems using measurement, simulation, and queueing models. Common mistakes and how to avoid them, selection of techniques and metrics, art of data presentation, summariz...
Raj Jain
GLOBECOM
2008
IEEE
14 years 3 months ago
Performance Metric Sensitivity Computation for Optimization and Trade-Off Analysis in Wireless Networks
Abstract—We develop and evaluate a new method for estimating and optimizing various performance metrics for multihop wireless networks, including MANETs. We introduce an approxim...
John S. Baras, Vahid Tabatabaee, George Papageorgi...
ICC
2009
IEEE
160views Communications» more  ICC 2009»
13 years 6 months ago
Reliability and Efficiency Analysis of Distributed Source Coding in Wireless Sensor Networks
We propose a comprehensive theoretical framework to evaluate reliability and energy consumption of distributed source coding (DSC) in wireless sensor networks (WSNs) applications. ...
Carlo Fischione, Stefano Tennina, Fortunato Santuc...