Sciweavers

1054 search results - page 175 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
AAECC
2005
Springer
128views Algorithms» more  AAECC 2005»
15 years 1 months ago
The size-change principle and dependency pairs for termination of term rewriting
Abstract In [24], a new size-change principle was proposed to verify termination of functional programs automatically. We extend this principle in order to prove termination and in...
René Thiemann, Jürgen Giesl
IJNSEC
2007
164views more  IJNSEC 2007»
15 years 1 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
CN
2004
109views more  CN 2004»
15 years 1 months ago
Modeling correlations in web traces and implications for designing replacement policies
A number of web cache-related algorithms, such as replacement and prefetching policies, rely on specific characteristics present in the sequence of requests for efficient performa...
Konstantinos Psounis, An Zhu, Balaji Prabhakar, Ra...
IJNM
2000
91views more  IJNM 2000»
15 years 1 months ago
Coding-based schemes for fault identification in communication networks
The complexity of communication networks and the amount of information transferred in these networks have made the management of such networks increasingly difficult. Since faults ...
Chi-Chun Lo, Shing Hong Chen, Bon-Yeh Lin
TIT
2002
64views more  TIT 2002»
15 years 1 months ago
Performance of blind and group-blind multiuser detectors
Abstract--In blind and group-blind multiuser detection, different detectors can be designed using either the sample data covariance matrix directly or its eigencomponents. Due to f...
Anders Høst-Madsen, Xiaodong Wang