Sciweavers

2237 search results - page 354 / 448
» On the Security of Random Sources
Sort
View
LCN
2003
IEEE
15 years 3 months ago
A Performance Study of Fast Handovers for Mobile IPv6
We conducted a simulative evaluation of the overall performance of Fast Handovers for Mobile IPv6 in comparison with the baseline Mobile IPv6 using the network simulator ns-2 for ...
Marc Torrent-Moreno, Xavier Pérez Costa, Se...
ICRA
2002
IEEE
84views Robotics» more  ICRA 2002»
15 years 2 months ago
Queueing Network Modeling and Lead Time Compression of Electronic Procurement
Abstract- Procurement, i.e., the process of obtaining materials or services and managing their inflow into organizations, is a critical process in supply chain management. Internet...
C. V. L. Raju, Y. Narahari
ICALP
2001
Springer
15 years 2 months ago
Hidden Pattern Statistics
Abstract. We consider the sequence comparison problem, also known as “hidden pattern” problem, where one searches for a given subsequence in a text (rather than a string unders...
Philippe Flajolet, Yves Guivarc'h, Wojciech Szpank...
COOPIS
1999
IEEE
15 years 2 months ago
Using Fagin's Algorithm for Merging Ranked Results in Multimedia Middleware
A distributed multimedia information system allows users to access data of different modalities, from different data sources, ranked by various combinationsof criteria. In [6], Fa...
Edward L. Wimmers, Laura M. Haas, Mary Tork Roth, ...
DCC
1998
IEEE
15 years 2 months ago
Optimal Multiple Description Transform Coding of Gaussian Vectors
Multiple description coding (MDC) is source coding for multiple channels such that a decoder which receives an arbitrary subset of the channels may produce a useful reconstruction...
Vivek K. Goyal, Jelena Kovacevic