Sciweavers

12697 search results - page 66 / 2540
» Call for Papers
Sort
View
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
15 years 4 months ago
Rebound Attack on Reduced-Round Versions of JH
Abstract. JH, designed by Wu, is one of the 14 second round candidates in the NIST Hash Competition. This paper presents the first analysis results of JH by using rebound attack. ...
Vincent Rijmen, Deniz Toz, Kerem Varici
CSE
2009
IEEE
15 years 4 months ago
Quantifying Reciprocity in Social Networks
In this paper we propose a new reciprocity index for quantifying social relationships based on mobile phone call detail records and Twitter blogs. We use this reciprocity index to ...
Huiqi Zhang, Ram Dantu, João W. Cangussu
PRDC
1999
IEEE
15 years 4 months ago
Availability and Performance Evaluation for Automatic Protection Switching in TDMA Wireless System
In this paper, we compare the availability and performance of a wireless TDMA system with and without automatic protection switching. Stochastic reward net models are constructed ...
Hairong Sun, Yonghuan Cao, Kishor S. Trivedi, Jame...
RTSS
1998
IEEE
15 years 4 months ago
Efficient Object Sharing in Quantum-Based Real-Time Systems
We consider the problem of implementing shared objects in uniprocessor and multiprocessor real-time systems in which tasks are executed using a scheduling quantum. In most quantum...
James H. Anderson, Rohit Jain, Kevin Jeffay
VLDB
1997
ACM
94views Database» more  VLDB 1997»
15 years 4 months ago
To Weave the Web
The paper discusses the issue of views in the Web context. We introduce a set of languages for managing and restructuring data coming from the World Wide Web. We present a specifi...
Paolo Atzeni, Giansalvatore Mecca, Paolo Merialdo