Sciweavers

22193 search results - page 4344 / 4439
» Multiple Restricted Multiplication
Sort
View
SCN
2010
Springer
144views Communications» more  SCN 2010»
14 years 9 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
SOCA
2010
IEEE
14 years 9 months ago
Weighted fair share scheduling for loosely controlled concurrent event systems
In asynchronous event systems, the production of an event is decoupled from its consumption via an event queue. The loose coupling of such systems allows great flexibility as to ...
Sean Rooney, Luis Garcés-Erice, Kristijan D...
SPIN
2010
Springer
14 years 9 months ago
Enacting Declarative Languages Using LTL: Avoiding Errors and Improving Performance
In our earlier work we have proposed using the declarative language DecSerFlow for modeling, analysis and enactment of processes in autonomous web services. DecSerFlow uses constra...
Maja Pesic, Dragan Bosnacki, Wil M. P. van der Aal...
TASLP
2010
153views more  TASLP 2010»
14 years 9 months ago
On Optimal Frequency-Domain Multichannel Linear Filtering for Noise Reduction
Abstract—Several contributions have been made so far to develop optimal multichannel linear filtering approaches and show their ability to reduce the acoustic noise. However, th...
Mehrez Souden, Jacob Benesty, Sofiène Affes
TC
2010
14 years 9 months ago
Stateless Multicasting in Mobile Ad Hoc Networks
—There are increasing interest and big challenge in designing a scalable and robust multicast routing protocol in a mobile ad hoc network (MANET) due to the difficulty in group ...
Xiaojing Xiang, Xin Wang, Yuanyuan Yang
« Prev « First page 4344 / 4439 Last » Next »