Sciweavers

1226 search results - page 173 / 246
» On Conditions for Linearity of Optimal Estimation
Sort
View
RTA
2007
Springer
15 years 4 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
IPPS
2006
IEEE
15 years 3 months ago
Solving generic role assignment exactly
role assignment is a programming abstraction that supports the assignment of user-defined roles to sensor nodes such that certain conditions are met. Many common network configu...
Christian Frank, Kay Römer
ESA
2004
Springer
166views Algorithms» more  ESA 2004»
15 years 3 months ago
Super Scalar Sample Sort
Sample sort, a generalization of quicksort that partitions the input into many pieces, is known as the best practical comparison based sorting algorithm for distributed memory para...
Peter Sanders, Sebastian Winkel
DSS
2006
95views more  DSS 2006»
14 years 10 months ago
On the computability of agent-based workflows
Workflow research is commonly concerned with optimization, modeling, and dependency. In this research, we however address a more fundamental issue. By modeling humans and machines...
Wai Yin Mok, Prashant Palvia, David Paper
JCM
2008
81views more  JCM 2008»
14 years 9 months ago
An Iterative Algorithm for Joint Symbol Timing Recovery and Equalization of Short Bursts
In this work a joint clock recovery (CR) and equalization scheme for short burst transmissions is presented. The joint optimization performance may be pursued by means of both data...
Pietro Savazzi, Paolo Gamba, Lorenzo Favalli