Sciweavers

8154 search results - page 1516 / 1631
» Understanding changes in use cases: A case study
Sort
View
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 4 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
ICLP
2005
Springer
15 years 4 months ago
Preference Reasoning
Abstract. Constraints and preferences are ubiquitous in real-life. Moreover, preferences can be of many kinds: qualitative, quantitative, conditional, positive or negative, to name...
Francesca Rossi
VLDB
2004
ACM
120views Database» more  VLDB 2004»
15 years 4 months ago
Merging the Results of Approximate Match Operations
Data Cleaning is an important process that has been at the center of research interest in recent years. An important end goal of effective data cleaning is to identify the relatio...
Sudipto Guha, Nick Koudas, Amit Marathe, Divesh Sr...
CODES
2003
IEEE
15 years 4 months ago
A multiobjective optimization model for exploring multiprocessor mappings of process networks
In the Sesame framework, we develop a modeling and simulation environment for the efficient design space exploration of heterogeneous embedded systems. Since Sesame recognizes se...
Cagkan Erbas, Selin C. Erbas, Andy D. Pimentel
INFOCOM
2003
IEEE
15 years 4 months ago
Input Queued Switches: Cell Switching vs. Packet Switching
— Input Queued(IQ) switches have been very well studied in the recent past. The main problem in the IQ switches concerns scheduling. The main focus of the research has been the ...
Yashar Ganjali, Abtin Keshavarzian, Devavrat Shah
« Prev « First page 1516 / 1631 Last » Next »