Sciweavers

1716 search results - page 270 / 344
» Proving Conditional Termination
Sort
View
96
Voted
CDC
2009
IEEE
119views Control Systems» more  CDC 2009»
15 years 5 months ago
Resource sharing optimality in WiFi infrastructure networks
Abstract— In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this...
Laura Giarré, Giovanni Neglia, Ilenia Tinni...
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
15 years 5 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
MICCAI
2001
Springer
15 years 5 months ago
A New Method for the Registration of Cardiac PET and MR Images Using Deformable Model Based Segmentation of the Main Thorax Stru
Abstract. Integration of magnetic resonance (MR) and positron emission tomography (PET) images of the heart has proved its usefulness for the estimation of the myocardial viability...
Timo Mäkelä, Patrick Clarysse, Jyrki L&o...
88
Voted
WIA
2001
Springer
15 years 5 months ago
Past Pushdown Timed Automata
d Abstract) Zhe Dang   , Tevfik Bultan ¡ , Oscar H. Ibarra ¡ , and Richard A. Kemmerer ¡ ¢ School of Electrical Engineering and Computer Science Washington State University P...
Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard ...
ECRTS
2000
IEEE
15 years 5 months ago
Tolerating faults while maximizing reward
The imprecise computation(IC) model is a general scheduling framework, capable of expressing the precision vs. timeliness trade-off involved in many current real-time applications...
Hakan Aydin, Rami G. Melhem, Daniel Mossé