Sciweavers

1006 search results - page 155 / 202
» Generating XML structure using examples and constraints
Sort
View
JNW
2008
79views more  JNW 2008»
14 years 9 months ago
A Proportional Jitter Scheduling and Buffer Management Algorithm for Differentiated Services Networks
This paper proposes a method for scheduling and buffer management in differentiated services networks which is based on JoBS algorithm. JoBS differentiates traffic classes base on ...
Mohammad Hossien Yaghmaee, Ghazale Khojasteh Tousi
IFIP
2010
Springer
14 years 4 months ago
Information Flow Analysis via Path Condition Refinement
We present a new approach to information flow control (IFC), ploits counterexample-guided abstraction refinement (CEGAR) technology. The CEGAR process is built on top of our existi...
Mana Taghdiri, Gregor Snelting, Carsten Sinz
ICDIM
2006
IEEE
15 years 3 months ago
Model-Driven Development of Content-Based Image Retrieval Systems
: Generic systems for content-based image retrieval (CBIR), such as QBIC [7] cannot be used to solve domain-specific image retrieval problems, as for example, the identification of...
Temenushka Ignatova
DATE
2000
IEEE
93views Hardware» more  DATE 2000»
15 years 2 months ago
Fast Evaluation of Sequence Pair in Block Placement by Longest Common Subsequence Computation
In [1], Murata et al introduced an elegant representation of block placement called sequence pair. All block placement algorithms which are based on sequence pairs use simulated a...
Xiaoping Tang, D. F. Wong, Ruiqi Tian
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
15 years 1 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares