Sciweavers

10907 search results - page 87 / 2182
» Constraint Based Strategies
Sort
View
ASPDAC
2006
ACM
112views Hardware» more  ASPDAC 2006»
15 years 11 months ago
Refinement strategies for verification methods based on datapath abstraction
Zaher S. Andraus, Mark H. Liffiton, Karem A. Sakal...
TCC
2005
Springer
102views Cryptology» more  TCC 2005»
15 years 11 months ago
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
The standard class of adversaries considered in cryptography is that of strict polynomial-time probabilistic machines. However, expected polynomial-time machines are often also co...
Jonathan Katz, Yehuda Lindell
WWIC
2005
Springer
129views Communications» more  WWIC 2005»
15 years 11 months ago
Comparison of Incentive-Based Cooperation Strategies for Hybrid Networks
Today’s public Wireless LANs are restricted to hotspots. With the current technology, providers can only target a small audience and in turn charge high prices for their service ...
Attila Weyland, Thomas Staub, Torsten Braun
ICT
2004
Springer
123views Communications» more  ICT 2004»
15 years 10 months ago
PRDS: A Priority Based Route Discovery Strategy for Mobile Ad Hoc Networks
Bosheng Zhou, Alan Marshall, Jieyi Wu, Tsung-Han L...
SSPR
2004
Springer
15 years 10 months ago
Distance Based Strategy for Supervised Document Image Classification
Fabien Carmagnac, Pierre Héroux, Éri...