Sciweavers

2767 search results - page 299 / 554
» Universal Exponentiation Algorithm
Sort
View
135
Voted
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
15 years 8 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
TACAS
2007
Springer
144views Algorithms» more  TACAS 2007»
15 years 8 months ago
Detecting Races in Ensembles of Message Sequence Charts
Abstract. The analysis of message sequence charts (MSCs) is highly important in preventing common problems in communication protocols. Detecting race conditions, i.e., possible dis...
Edith Elkind, Blaise Genest, Doron Peled
ACSD
2006
IEEE
105views Hardware» more  ACSD 2006»
15 years 8 months ago
Throughput Analysis of Synchronous Data Flow Graphs
Synchronous Data Flow Graphs (SDFGs) are a useful tool for modeling and analyzing embedded data flow applications, both in a single processor and a multiprocessing context or for...
Amir Hossein Ghamarian, Marc Geilen, Sander Stuijk...
112
Voted
ICTAI
2006
IEEE
15 years 8 months ago
Sustained Emerging Spatio-Temporal Co-occurrence Pattern Mining: A Summary of Results
Sustained emerging spatio-temporal co-occurrence patterns (SECOPs) represent subsets of object-types that are increasingly located together in space and time. Discovering SECOPs i...
Mete Celik, Shashi Shekhar, James P. Rogers, James...
110
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Optimal Energy and Delay Tradeoffs for Multi-User Wireless Downlinks
— We consider the fundamental delay tradeoffs for minimizing energy expenditure in a multi-user wireless downlink with randomly varying channels. First, we extend the BerryGallag...
Michael J. Neely