Sciweavers

8067 search results - page 78 / 1614
» A Model Proposal of the Interoperability Problem
Sort
View
IEEEHPCS
2010
15 years 1 months ago
Timed protocols insecurity problem is NP-complete
—In this paper we study the protocol insecurity problem for time dependent security protocols with a finite number of sessions, extending to the timed case the results of M. Rus...
Massimo Benerecetti, Nicola Cuomo, Adriano Peron
CORR
2008
Springer
105views Education» more  CORR 2008»
15 years 3 months ago
Simulation Optimization of the Crossdock Door Assignment Problem
: The purpose of this report is to present the Crossdock Door Assignment Problem, which involves assigning destinations to outbound dock doors of Crossdock centres such that travel...
Uwe Aickelin, Adrian Adewunmi
97
Voted
ICMCS
2007
IEEE
104views Multimedia» more  ICMCS 2007»
15 years 9 months ago
A Perception-based Scalable Encryption Model for AVS Audio
Audio Video coding Standard (AVS) is China’s secondgeneration source coding/decoding standard with fully Intellectual Properties. As the sixth part of AVS standard, AVSDRM aims ...
Lan Juan, Huang Tie-Jun, Qu Jun-Hua
AAAI
1996
15 years 4 months ago
Deciding to Remind During Collaborative Problem Solving: Empirical Evidence for Agent Strategies
Previous work suggests that reminding a conversational partner of mutually known information depends on the conversants' attentional state, their resource limits and the reso...
Pamela W. Jordan, Marilyn A. Walker
EWSN
2009
Springer
16 years 3 months ago
Solving the Wake-Up Scattering Problem Optimally
Abstract. In their EWSN'07 paper [1], Giusti et al. proposed a decentralized wake-up scattering algorithm for temporally spreading the intervals in which the nodes of a wirele...
Luigi Palopoli, Roberto Passerone, Amy L. Murphy, ...