Sciweavers

113 search results - page 5 / 23
» When Simulation Meets Antichains
Sort
View
168
Voted
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
14 years 7 months ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
ICCAD
2006
IEEE
101views Hardware» more  ICCAD 2006»
16 years 17 days ago
Guaranteeing performance yield in high-level synthesis
Meeting timing constraint is one of the most important issues for modern design automation tools. This situation is exacerbated with the existence of process variation. Current hi...
Wei-Lun Hung, Xiaoxia Wu, Yuan Xie
133
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
A Theory of QoS for Wireless
—Wireless networks are increasingly used to carry applications with QoS constraints. Two problems arise when dealing with traffic with QoS constraints. One is admission control,...
I-Hong Hou, Vivek Borkar, P. R. Kumar
131
Voted
ICC
2008
IEEE
142views Communications» more  ICC 2008»
15 years 10 months ago
End-to-End Outage Probability Minimization in OFDM Based Linear Multi-Hop Networks
Abstract— This paper is concerned with the end-to-end transmission outage in an OFDM based wireless multi-hop network. The network consists of a source node, a destination node, ...
Xiaolu Zhang, Meixia Tao, Wenhua Jiao, Chun Sum Ng
156
Voted
HPCC
2010
Springer
15 years 3 months ago
A Generic Execution Management Framework for Scientific Applications
Managing the execution of scientific applications in a heterogeneous grid computing environment can be a daunting task, particularly for long running jobs. Increasing fault tolera...
Tanvire Elahi, Cameron Kiddle, Rob Simmonds