Sciweavers

355 search results - page 36 / 71
» Overlapping Communication and Computation with High Level Co...
Sort
View
CODES
2007
IEEE
15 years 5 months ago
Synchronization after design refinements with sensitive delay elements
The synchronous computational model with its simple computation and communication mechanism makes it easy to describe, simulate and formally verify synchronous embedded systems at...
Tarvo Raudvere, Ingo Sander, Axel Jantsch
APNOMS
2006
Springer
15 years 5 months ago
NETSAQ: Network State Adaptive QoS Provisioning for MANETs
The provision of ubiquitous services in Mobile Ad-hoc Networks (MANETs) is a great challenge, considering the bandwidth, mobility, and computational-resources constraints exhibited...
Shafique Ahmad Chaudhry, Faysal Adeem Siddiqui, Al...
ICICS
2004
Springer
15 years 7 months ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...
TWC
2008
86views more  TWC 2008»
15 years 1 months ago
On the Spectral Efficiency of CDMA Downlink Cellular Mobile Networks
A new accurate mathematical analysis is presented for the efficient computation of the spectral efficiency of CDMA downlink wireless communication systems in the presence of multip...
Khairi Ashour Hamdi, Pongsatorn Sedtheetorn
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
15 years 8 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell