Sciweavers

CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 3 months ago
Client-to-Client Streaming Scheme for VOD Applications
In this paper, we propose an efficient client-to-client streaming approach to cooperatively stream the video using chaining technique with unicast communication among the clients....
M. Dakshayini, T. R. Gopala Krishnan Nair
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 4 months ago
Automatically Discovering Hidden Transformation Chaining Constraints
Abstract. Model transformations operate on models conforming to precisely defined metamodels. Consequently, it often seems relatively easy to chain them: the output of a transforma...
Raphaël Chenouard, Frédéric Jou...
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
13 years 7 months ago
Cryptanalysis of the LAKE Hash Family
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitiv...
Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitr...
CP
2004
Springer
13 years 9 months ago
Generating Robust Partial Order Schedules
This paper considers the problem of transforming a resource feasible, fixed-times schedule into a partial order schedule (POS) to enhance its robustness and stability properties. ...
Nicola Policella, Angelo Oddi, Stephen F. Smith, A...