Sciweavers

2314 search results - page 444 / 463
» What's in a model
Sort
View
ASPDAC
2000
ACM
95views Hardware» more  ASPDAC 2000»
13 years 12 months ago
Fair watermarking techniques
Many intellectual property protection (IPP) techniques have been proposed. Their primary objectives are providing convincible proof of authorship with least degradation of the qua...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak
SIGMETRICS
2000
ACM
101views Hardware» more  SIGMETRICS 2000»
13 years 12 months ago
On achievable service differentiation with token bucket marking for TCP
The Differentiated services (diffserv) architecture has been proposed as a scalable solution for providing service differentiation among flows without any per-flow buffer manage...
Sambit Sahu, Philippe Nain, Christophe Diot, Victo...
DEXA
1999
Springer
87views Database» more  DEXA 1999»
13 years 12 months ago
SECONDO/QP: Implementation of a Generic Query Processor
: In an extensible database system, evaluation of a query plan is done in cooperation between a collection of operator implementation functions and a component of the DBMS that we ...
Ralf Hartmut Güting, Stefan Dieker, Claudia F...
ECAL
1999
Springer
13 years 12 months ago
Dynamical Systems Game
The “social dilemma” is a problem inherent in forming and maintaining cooperation among selfish individuals, and is of fundamental importance in the biological and social sci...
Eizo Akiyama, Kunihiko Kaneko
AC
1998
Springer
13 years 11 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail