Sciweavers

10907 search results - page 87 / 2182
» Constraint Based Strategies
Sort
View
ASPDAC
2006
ACM
112views Hardware» more  ASPDAC 2006»
15 years 3 months ago
Refinement strategies for verification methods based on datapath abstraction
Zaher S. Andraus, Mark H. Liffiton, Karem A. Sakal...
TCC
2005
Springer
102views Cryptology» more  TCC 2005»
15 years 3 months ago
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
The standard class of adversaries considered in cryptography is that of strict polynomial-time probabilistic machines. However, expected polynomial-time machines are often also co...
Jonathan Katz, Yehuda Lindell
WWIC
2005
Springer
129views Communications» more  WWIC 2005»
15 years 3 months ago
Comparison of Incentive-Based Cooperation Strategies for Hybrid Networks
Today’s public Wireless LANs are restricted to hotspots. With the current technology, providers can only target a small audience and in turn charge high prices for their service ...
Attila Weyland, Thomas Staub, Torsten Braun
ICT
2004
Springer
123views Communications» more  ICT 2004»
15 years 3 months ago
PRDS: A Priority Based Route Discovery Strategy for Mobile Ad Hoc Networks
Bosheng Zhou, Alan Marshall, Jieyi Wu, Tsung-Han L...
SSPR
2004
Springer
15 years 3 months ago
Distance Based Strategy for Supervised Document Image Classification
Fabien Carmagnac, Pierre Héroux, Éri...