Sciweavers

17049 search results - page 87 / 3410
» cans 2007
Sort
View
COR
2007
121views more  COR 2007»
13 years 8 months ago
An approximation scheme for two-machine flowshop scheduling with setup times and an availability constraint
This paper studies the two-machine permutation flowshop scheduling problem with anticipatory setup times and an availability constraint imposed only on the first machine. The obje...
Xiuli Wang, T. C. Edwin Cheng
AMC
2005
124views more  AMC 2005»
13 years 8 months ago
An efficient undeniable group-oriented signature scheme
Three main methods with favorable security and efficiency can be considered in the design of cryptosystems. These methods are integer factorization systems (of which RSA is the be...
Tzer-Shyong Chen, Jen-Yan Huang, Tzer-Long Chen
AMC
2005
121views more  AMC 2005»
13 years 8 months ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao
APPML
2005
120views more  APPML 2005»
13 years 8 months ago
A convection model for fire spread simulation
We present a convection model which can be coupled with fire propagation models in order to take into account the wind and the slope which are two of the most relevant factors aff...
M. Isabel Asensio, Luis Ferragut, Jacques Simon
ARSCOM
2005
94views more  ARSCOM 2005»
13 years 8 months ago
Isometrically Embedded Graphs
Can an arbitrary graph be embedded in Euclidean space so that the isometry group of its vertex set is precisely its graph automorphism group? This paper gives an affirmative answe...
Debra L. Boutin