Sciweavers

738 search results - page 95 / 148
» Exploiting Locality in Searching the Web
Sort
View
GLOBECOM
2006
IEEE
15 years 5 months ago
Improving Voice and Data Service Provisioning in Cellular/WLAN Integrated Networks by Admission Control
— In this paper, we study the voice and data service provisioning in an integrated system of cellular and wireless local area networks (WLANs). To maximize the overall resource u...
Wei Song, Yu Cheng, Weihua Zhuang, Aladdin Saleh
CP
2004
Springer
15 years 3 months ago
Full Dynamic Substitutability by SAT Encoding
Symmetry in constraint problems can be exploited to greatly improve search performance. A form of symmetry that has been the subject of considerable research is value interchangeab...
Steven David Prestwich
CAV
2005
Springer
86views Hardware» more  CAV 2005»
15 years 5 months ago
Syntax-Driven Reachable State Space Construction of Synchronous Reactive Programs
We consider in the current paper the issue of exploiting the structural form of Esterel programs [BG92] to partition the algorithmic RSS (reachable state space) fix-point construc...
Eric Vecchié, Robert de Simone
FCCM
2008
IEEE
153views VLSI» more  FCCM 2008»
15 years 6 months ago
A SRAM-based Architecture for Trie-based IP Lookup Using FPGA
Internet Protocol (IP) lookup in routers can be implemented by some form of tree traversal. Pipelining can dramatically improve the search throughput. However, it results in unbal...
Hoang Le, Weirong Jiang, Viktor K. Prasanna
FSE
2006
Springer
111views Cryptology» more  FSE 2006»
15 years 3 months ago
Analysis of Step-Reduced SHA-256
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying technique...
Florian Mendel, Norbert Pramstaller, Christian Rec...