Sciweavers

2661 search results - page 430 / 533
» Quantum Complexity Classes
Sort
View
IANDC
2008
120views more  IANDC 2008»
15 years 3 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
CN
2006
99views more  CN 2006»
15 years 3 months ago
High-performance switching based on buffered crossbar fabrics
As buffer-less crossbar scheduling algorithms reach their practical limitations due to higher port numbers and data rates, internally buffered crossbar (IBC) switches have gained ...
Lotfi Mhamdi, Mounir Hamdi, Christopher Kachris, S...
130
Voted
COMCOM
2006
89views more  COMCOM 2006»
15 years 3 months ago
Quantifying the effects of recent protocol improvements to TCP: Impact on Web performance
We assess the state of Internet congestion control and error recovery through a controlled study that considers the integration of standards-track TCP error recovery and both TCP ...
Michele C. Weigle, Kevin Jeffay, F. Donelson Smith
CORR
2006
Springer
87views Education» more  CORR 2006»
15 years 3 months ago
Pseudorandomness and Combinatorial Constructions
Abstract. In combinatorics, the probabilistic method is a very powerful tool to prove the existence of combinatorial objects with interesting and useful properties. Explicit constr...
Luca Trevisan
DATAMINE
2006
83views more  DATAMINE 2006»
15 years 3 months ago
Structural Hidden Markov Models Using a Relation of Equivalence: Application to Automotive Designs
Standard hidden Markov models (HMM's) have been studied extensively in the last two decades. It is well known that these models assume state conditional independence of the ob...
Djamel Bouchaffra, Jun Tan