Sciweavers

36 search results - page 1 / 8
» Breaking the chain
Sort
View
JACM
2008
90views more  JACM 2008»
13 years 5 months ago
Bit complexity of breaking and achieving symmetry in chains and rings
We consider a failure-free, asynchronous message passing network with n links, where the processors are arranged on a ring or a chain. The processors are identically programmed bu...
Yefim Dinitz, Shlomo Moran, Sergio Rajsbaum
COMPSEC
1998
87views more  COMPSEC 1998»
13 years 5 months ago
Breaking the chain
Sarah Gordon
SAC
2012
ACM
12 years 1 months ago
Decrypting classical cipher text using Markov chain Monte Carlo
In this paper, we present the use of Markov Chain Monte Carlo (MCMC) methods to attack the classical ciphers. We use frequency analysis as our basic tool. First we investigate the...
Jian Chen, Jeffrey S. Rosenthal
SIAMAM
2000
131views more  SIAMAM 2000»
13 years 5 months ago
The Description of Homogeneous Branched-Chain Explosions with Slow Radical Recombination by Self-Adjusting Time Scales
A nonlinear multiscale technique is used to describe the time history of a spatially homogeneous chain-branching/chain-breaking explosion when chain branching is much faster than c...
Antonio L. Sanchez, Luis L. Bonilla, Manuel Carret...
ADHOCNOW
2009
Springer
14 years 11 days ago
TCP over Multi-Hop Wireless Networks: The Impact of MAC Level Interactions
In Multi Hop Wireless Networks (MHWNs), nodes act both as end-hosts as well as intermediate routers. When communication occurs, these nodes form chains between different sources a...
Adnan Majeed, Saquib Razak, Nael B. Abu-Ghazaleh, ...