Sciweavers

5344 search results - page 208 / 1069
» Privacy-Preserving Set Operations
Sort
View
114
Voted
DATE
2007
IEEE
107views Hardware» more  DATE 2007»
15 years 10 months ago
Development of an ASIP enabling flows in ethernet access using a retargetable compilation flow
In this paper we research an FPGA based Application Specific Instruction Set Processor (ASIP) tailored to the needs of a flow aware Ethernet access node using a retargetable com...
K. Van Renterghem, P. Demuytere, Dieter Verhulst, ...
115
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Semi-Markov Modeling for Bandwidth Sharing of TCP Connections with Asymmetric AIMD Congestion Control
— This paper presents a semi-Markov model that evaluates the performance of TCP connections with asymmetric Additive Increase and Multiplicative Decrease (AIMD) congestion contro...
Cheng Peng Fu, Chuan Heng Foh, Chiew Tong Lau, Zhi...
124
Voted
CPAIOR
2005
Springer
15 years 9 months ago
Combination of Among and Cardinality Constraints
A cardinality constraint imposes that each value of a set V must be taken a certain number of times by a set of variables X, whereas an among constraint imposes that a certain numb...
Jean-Charles Régin
TPHOL
2002
IEEE
15 years 8 months ago
Quotient Types: A Modular Approach
In this paper we introduce a new approach to axiomatizing quotient types in type theory. We suggest replacing the existing monolithic rule set by a modular set of rules for a speci...
Aleksey Nogin
HYBRID
2001
Springer
15 years 8 months ago
Robust Controller Synthesis for Hybrid Systems Using Modal Logic
Abstract. In this paper, we formulate and robustly solve a quite general class of hybrid controller synthesis problems. The type of controller we investigate is the switching contr...
Thomas Moor, Jennifer M. Davoren