Sciweavers

1894 search results - page 257 / 379
» A TLA Proof System
Sort
View
ISCAS
2008
IEEE
97views Hardware» more  ISCAS 2008»
15 years 10 months ago
Quality-aware GSM speech watermarking
—Use of watermarking techniques to provide authentication and tamper proofing of speech in mobile environment is becoming important. However, the current efforts do not allow for...
K. J.-L. Christabel, Sabu Emmanuel, Mohan S. Kanka...
TPHOL
2008
IEEE
15 years 10 months ago
Canonical Big Operators
In this paper, we present an approach to describe uniformly iterated “big” operations, like Pn i=0 f(i) or maxi∈I f(i) and to provide lemmas that encapsulate all the commonly...
Yves Bertot, Georges Gonthier, Sidi Ould Biha, Ioa...
AINA
2007
IEEE
15 years 10 months ago
Performance Evaluation of Multicast Cost Sharing Mechanisms
In this paper we investigate experimentally the performance of Marginal Cost (MC) and Shapley Value (SH) mechanisms for sharing the cost of multicast transmissions. We implement a...
Nandan Garg, Daniel Grosu
ARITH
2007
IEEE
15 years 10 months ago
Multiplication by a Constant is Sublinear
Abstract— This paper explores the use of the double-base number system (DBNS) for constant integer multiplication. The DBNS recoding scheme represents integers – in this case c...
Vassil S. Dimitrov, Laurent Imbert, Andrew Zakaluz...
SEFM
2007
IEEE
15 years 10 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi