Sciweavers

9842 search results - page 1659 / 1969
» Compositional timing analysis
Sort
View
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
15 years 5 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel
ATAL
2010
Springer
15 years 5 months ago
Parameterizing the winner determination problem for combinatorial auctions
Combinatorial auctions have been studied by the multiagent systems community for some time, since these auctions are an effective mechanism for resource allocation when agents are...
David Loker, Kate Larson
ATAL
2010
Springer
15 years 5 months ago
Honor among thieves: collusion in multi-unit auctions
We consider collusion in multi-unit auctions where the allocation and payments are determined using the VCG mechanism. We show how collusion can increase the utility of the collud...
Yoram Bachrach
CCGRID
2010
IEEE
15 years 5 months ago
Streamflow Programming Model for Data Streaming in Scientific Workflows
Geo-sciences involve large-scale parallel models, high resolution real time data from highly asynchronous and heterogeneous sensor networks and instruments, and complex analysis a...
Chathura Herath, Beth Plale
CCGRID
2010
IEEE
15 years 5 months ago
Decentralized Resource Availability Prediction for a Desktop Grid
In a desktop grid model, the job (computational task) is submitted for execution in the resource only when the resource is idle. There is no guarantee that the job which has starte...
Karthick Ramachandran, Hanan Lutfiyya, Mark Perry
« Prev « First page 1659 / 1969 Last » Next »