Sciweavers

CATS
2007
13 years 10 months ago
An Optimal Broadcasting Protocol for Mobile Video-on-Demand
The advance of wireless and mobile technology introduces a new type of Video-on-Demand (VOD) systems, namely the mobile VOD systems, that provide VOD services to mobile clients. I...
Regant Y. S. Hung, Hing-Fung Ting
CATS
2007
13 years 10 months ago
Termination of Abstract Reduction Systems
Jeremy E. Dawson, Rajeev Goré
CATS
2007
13 years 10 months ago
Quantum List Decoding from Quantumly Corrupted Codewords for Classical Block Codes of Polynomially Small Rate
d Abstract) Tomoyuki Yamakami Department of Computer Software, University of Aizu 90 Kami-Iawase, Tsuruga, Ikki-machi, Fukushima 965-8580, Japan Our task of quantum list decoding ...
Tomoyuki Yamakami
CIE
2010
Springer
13 years 10 months ago
The Limits of Tractability in Resolution-Based Propositional Proof Systems
We study classes of propositional contradictions based on the Least Number Principle (LNP) in the refutation system of Resolution and its generalisations with bounded conjunction, ...
Stefan S. Dantchev, Barnaby Martin
ICIC
2007
Springer
13 years 10 months ago
Parameter Tuning for Buck Converters Using Genetic Algorithms
The buck converter is one of DC/DC converters that are often used as power supplies. This paper presents parameter tuning methods to obtain circuit element values for the buck conv...
Young-Kiu Choi, Byung-Wook Jung
EUC
2008
Springer
13 years 10 months ago
Trusted Spanning Tree for Delay Tolerant MANETs
Quality of service is an important issue in Delay Tolerant Mobile Ad-Hoc Networks (DTMs). This work attempts to improve the Quality of service (QoS) in DTMs by relying on spanning...
Apivadee Piyatumrong, Pascal Bouvry, Fréd&e...
EUC
2008
Springer
13 years 10 months ago
An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc Networks
The broadcast operation is a fundamental service in wireless ad hoc networks. The na
Yu Huang 0002, Bo Liu, XianPing Tao, Jiannong Cao,...
EUC
2008
Springer
13 years 10 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
EUC
2008
Springer
13 years 10 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...