Sciweavers

6978 search results - page 217 / 1396
» Reframing Requirements Analysis
Sort
View
157
Voted
ACISP
2010
Springer
15 years 3 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
CORR
2008
Springer
80views Education» more  CORR 2008»
15 years 5 months ago
Channel and Multiuser Diversities in Wireless Systems: Delay-Energy Tradeoff
We consider a communication system with multi-access fading channel. Each user in the system requires certain rate guarantee. Our main contribution is to devise a scheduling scheme...
Prasanna Chaporkar, Kimmo Kansanen, Ralf R. Mü...
ICPP
2006
IEEE
15 years 11 months ago
Data-Flow Analysis for MPI Programs
Message passing via MPI is widely used in singleprogram, multiple-data (SPMD) parallel programs. Existing data-flow frameworks do not model the semantics of message-passing SPMD ...
Michelle Mills Strout, Barbara Kreaseck, Paul D. H...
PR
2006
99views more  PR 2006»
15 years 5 months ago
Class-dependent PCA, MDC and LDA: A combined classifier for pattern classification
Several pattern classifiers give high classification accuracy but their storage requirements and processing time are severely expensive. On the other hand, some classifiers requir...
Alok Sharma, Kuldip K. Paliwal, Godfrey C. Onwubol...
TDSC
2011
15 years 10 days ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...