Sciweavers

2501 search results - page 351 / 501
» Logics with Rank Operators
Sort
View
SIPS
2006
IEEE
15 years 10 months ago
Carry Prediction and Selection for Truncated Multiplication
This paper presents an error compensation method for truncated multiplication. From two n-bit operands, the operator produces an n-bit product with small error compared to the 2n-b...
Romain Michard, Arnaud Tisserand, Nicolas Veyrat-C...
IWCMC
2006
ACM
15 years 10 months ago
A simulation study of a MAC layer protocol for wireless networks with asymmetric links
— Asymmetric links are common in wireless networks for a variety of physical, logical, operational, and legal considerations. An asymmetric link supports uni-directional communic...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
HICSS
2005
IEEE
223views Biometrics» more  HICSS 2005»
15 years 10 months ago
Intelligent Agent Supported Business Process Management
The complex business environment requires managing business processes with the ability to adapt to changes and to collaborate in activities. Conventional workflow approaches based...
Minhong Wang, Huaiqing Wang
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 10 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
15 years 10 months ago
Advanced Indexing Techniques for Wide-Area Network Monitoring
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...