Sciweavers

199 search results - page 31 / 40
» The Residue Logarithmic Number System: Theory and Implementa...
Sort
View
77
Voted
HICSS
2007
IEEE
212views Biometrics» more  HICSS 2007»
15 years 4 months ago
Fully-automatic generation of user interfaces for multiple devices from a high-level model based on communicative acts
The problems involved in the development of user interfaces become even more severe through the ubiquitous use of a variety of devices such as PCs, mobile phones and PDAs. Each of...
Jürgen Falb, Roman Popp, Thomas Röck, He...
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 3 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 1 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
ATAL
2006
Springer
15 years 1 months ago
How equitable is rational negotiation?
Notions of fairness have recently received increased attention in the context of resource allocation problems, pushed by diverse applications where not only pure utilitarian effic...
Sylvia Estivie, Yann Chevaleyre, Ulle Endriss, Nic...
MOBIHOC
2010
ACM
14 years 7 months ago
Globs in the primordial soup: the emergence of connected crowds in mobile wireless networks
In many practical scenarios, nodes gathering at points of interest yield sizable connected components (clusters), which sometimes comprise the majority of nodes. While recent anal...
Simon Heimlicher, Kavé Salamatian