Sciweavers

26 search results - page 5 / 6
» Any Domain of Attraction for a Linear Constrained System is ...
Sort
View
FC
1997
Springer
86views Cryptology» more  FC 1997»
13 years 9 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
TMC
2008
107views more  TMC 2008»
13 years 5 months ago
A Mutual Network Synchronization Method for Wireless Ad Hoc and Sensor Networks
Mutual network synchronization is a distributed method in which geographically separated clocks align their times to one another without the need of reference or master clocks. Mut...
Carlos H. Rentel, Thomas Kunz
ATAL
2008
Springer
13 years 7 months ago
A tractable and expressive class of marginal contribution nets and its applications
Coalitional games raise a number of important questions from the point of view of computer science, key among them being how to represent such games compactly, and how to efficien...
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldber...
GLOBECOM
2008
IEEE
13 years 5 months ago
Modified Beacon-Enabled IEEE 802.15.4 MAC for Lower Latency
Industrial sensing, monitoring and automation offer a lucrative application domain for networking and communications. Wired sensor networks have traditionally been used for these ...
G. Bhatti, A. Mehta, Zafer Sahinoglu, J. Zhang, R....
IPPS
1997
IEEE
13 years 8 months ago
Designing Efficient Distributed Algorithms Using Sampling Techniques
In this paper we show the power of sampling techniques in designing efficient distributed algorithms. In particular, we show that using sampling techniques, on some networks, sele...
Sanguthevar Rajasekaran, David S. L. Wei