Sciweavers

2632 search results - page 423 / 527
» Alternating Timed Automata
Sort
View
IJNSEC
2008
135views more  IJNSEC 2008»
15 years 1 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
CCE
2007
15 years 1 months ago
Adaptive optimisation of noisy black-box functions inherent in microscopic models
For systems where exact constitutive relations are unknown, a microscopic level description can be alternatively used. As microscopic simulations are computationally expensive, th...
Eddie Davis, Marianthi G. Ierapetritou
CN
2007
115views more  CN 2007»
15 years 1 months ago
Parallel overlays for high data-rate multicast data transfer
Recently a number of application-layer multicast (ALM) protocols have been proposed as a promising alternative to deploying multicast services in the unicast-only Internet. Curren...
Ka Ki To, Jack Y. B. Lee
JIIS
2008
104views more  JIIS 2008»
15 years 1 months ago
Transaction Management for Flash Media Databases in Portable Computing Environments
Flash memory is becoming a major database storage in building embedded systems or portable devices because of its non-volatile, shock-resistant, power-economic nature, and fast acc...
Siwoo Byun
DEDS
2007
104views more  DEDS 2007»
15 years 1 months ago
Trellis Processes : A Compact Representation for Runs of Concurrent Systems
The unfolding of a concurrent system represents in a compact manner all possible runs of this system. Unfoldings are used in many applications, ranging from model-checking (offlin...
Eric Fabre