Sciweavers

2165 search results - page 216 / 433
» cases 2005
Sort
View
ACISP
2005
Springer
15 years 6 months ago
Redundant Trinomials for Finite Fields of Characteristic 2
Abstract. In this article we introduce redundant trinomials to represent elements of finite fields of characteristic 2. This paper develops applications to cryptography, especial...
Christophe Doche
AMOST
2005
ACM
15 years 6 months ago
Early estimation of defect density using an in-process Haskell metrics model
Early estimation of defect density of a product is an important step towards the remediation of the problem associated with affordably guiding corrective actions in the software d...
Mark Sherriff, Nachiappan Nagappan, Laurie A. Will...
AP2PC
2005
Springer
15 years 6 months ago
A Trust Management Scheme in Structured P2P Systems
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
CF
2005
ACM
15 years 6 months ago
Skewed caches from a low-power perspective
The common approach to reduce cache conflicts is to increase the associativity. From a dynamic power perspective this associativity comes at a high cost. In this paper we present...
Mathias Spjuth, Martin Karlsson, Erik Hagersten
CONEXT
2005
ACM
15 years 6 months ago
Positioning mobile base station to prolong wireless sensor network lifetime
Energy efficiency is a critical issue in designing sensor networks, as the nodes have limited battery power. In this paper we propose to move the BS so as to prolong the network l...
Dorottya Vass, Attila Vidács