Sciweavers

2924 search results - page 522 / 585
» On the Use of Evidence in Neural Networks
Sort
View
140
Voted
IWSEC
2009
Springer
15 years 8 months ago
Impossible Boomerang Attack for Block Cipher Structures
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differ...
Jiali Choy, Huihui Yap
EUROPAR
2007
Springer
15 years 7 months ago
Surrendering Autonomy: Can Cooperative Mobility Help?
In this paper, we develop a Cooperative Mobility Model that captures new salient features of collaborative and mission-oriented MANETs. In particular, the cost-benefit framework o...
Ghassen Ben Brahim, Bilal Khan, Ala I. Al-Fuqaha, ...
PDP
2005
IEEE
15 years 7 months ago
Memory Bandwidth Aware Scheduling for SMP Cluster Nodes
Clusters of SMPs are becoming increasingly common. However, the shared memory design of SMPs and the consequential contention between system processors for access to main memory c...
Evangelos Koukis, Nectarios Koziris
KNINVI
2005
Springer
15 years 7 months ago
Representational Correspondence as a Basic Principle of Diagram Design
The timeworn claim that a picture is worth a thousand words is generally well-supported by empirical evidence, suggesting that diagrams and other information graphics can enhance h...
Christopher F. Chabris, Stephen M. Kosslyn
NOSSDAV
2005
Springer
15 years 7 months ago
Natural selection in peer-to-peer streaming: from the cathedral to the bazaar
Success of peer-to-peer applications in many cases is attributed to user altruism, where a user contributes some of its own resources to facilitate performance of other users. Thi...
Vivek Shrivastava, Suman Banerjee