Sciweavers

310 search results - page 38 / 62
» Why Delannoy numbers
Sort
View
HICSS
2003
IEEE
90views Biometrics» more  HICSS 2003»
14 years 3 months ago
Enterprise Wide Development - A Survey of Critical Factors for Co-Ordinated Development in Complex Organizations: What Developme
This paper describes critical factors for co-ordinated enterprise and IS/IT development and change in complex organizations in Sweden. These factors represent an answer on the cru...
Magnus Holmqvist, Håkan Enquist
DAC
2003
ACM
14 years 3 months ago
Advanced techniques for RTL debugging
Conventional register transfer level (RTL) debugging is based on overlaying simulation results on structural connectivity information of the Hardware Description Language (HDL) so...
Yu-Chin Hsu, Bassam Tabbara, Yirng-An Chen, Fur-Sh...
DSOM
2003
Springer
14 years 3 months ago
Towards Peer-to-Peer Traffic Analysis Using Flows
One of the main problems with today's Internet traffic analysis is caused by the large number of network-based applications whose types and traffic patterns are more complicat...
Myung-Sup Kim, Hun-Jeong Kang, James Won-Ki Hong
INDOCRYPT
2003
Springer
14 years 3 months ago
Security Analysis of Several Group Signature Schemes
At Eurocrypt’91, Chaum and van Heyst introduced the concept of group signature. In such a scheme, each group member is allowed to sign messages on behalf of a group anonymously. ...
Guilin Wang
DSN
2002
IEEE
14 years 2 months ago
A Realistic Look At Failure Detectors
This paper shows that, in an environment where we do not bound the number of faulty processes, the class P of Perfect failure detectors is the weakest (among realistic failure det...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...