Sciweavers

275 search results - page 8 / 55
» The Polling Primitive for Computer Networks
Sort
View
CODES
2001
IEEE
15 years 1 months ago
A trace transformation technique for communication refinement
Models of computation like Kahn and dataflow process networks provide convenient means for modeling signal processing applicahis is partly due to the abstract primitives that thes...
Paul Lieverse, Pieter van der Wolf, Ed F. Deprette...
LCN
1999
IEEE
15 years 1 months ago
Packet Level Performance Characteristics of a MAC Protocol for Wireless ATM LANs
This paper determines packet level performance measures of a MAC protocol for a wireless ATM local area network. A key characteristic of the MAC protocol is the Identi er Splittin...
Benny Van Houdt, Chris Blondia, Olga Casals, Jorge...
CRYPTO
2010
Springer
151views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak
77
Voted
POLICY
2007
Springer
15 years 3 months ago
Adaptive Web Data Extraction Policies
Web data extraction is concerned, among other things, with routine data accessing and downloading from continuously-updated dynamic Web pages. There is a relevant trade-off between...
Giacomo Fiumara, Massimo Marchi, Alessandro Provet...
CVPR
2012
IEEE
12 years 12 months ago
Sum-product networks for modeling activities with stochastic structure
This paper addresses recognition of human activities with stochastic structure, characterized by variable spacetime arrangements of primitive actions, and conducted by a variable ...
Mohamed R. Amer, Sinisa Todorovic