Sciweavers

113 search results - page 5 / 23
» When Simulation Meets Antichains
Sort
View
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
14 years 1 months ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
71
Voted
ICCAD
2006
IEEE
101views Hardware» more  ICCAD 2006»
15 years 6 months ago
Guaranteeing performance yield in high-level synthesis
Meeting timing constraint is one of the most important issues for modern design automation tools. This situation is exacerbated with the existence of process variation. Current hi...
Wei-Lun Hung, Xiaoxia Wu, Yuan Xie
INFOCOM
2009
IEEE
15 years 4 months ago
A Theory of QoS for Wireless
—Wireless networks are increasingly used to carry applications with QoS constraints. Two problems arise when dealing with traffic with QoS constraints. One is admission control,...
I-Hong Hou, Vivek Borkar, P. R. Kumar
ICC
2008
IEEE
142views Communications» more  ICC 2008»
15 years 4 months ago
End-to-End Outage Probability Minimization in OFDM Based Linear Multi-Hop Networks
Abstract— This paper is concerned with the end-to-end transmission outage in an OFDM based wireless multi-hop network. The network consists of a source node, a destination node, ...
Xiaolu Zhang, Meixia Tao, Wenhua Jiao, Chun Sum Ng
HPCC
2010
Springer
14 years 9 months ago
A Generic Execution Management Framework for Scientific Applications
Managing the execution of scientific applications in a heterogeneous grid computing environment can be a daunting task, particularly for long running jobs. Increasing fault tolera...
Tanvire Elahi, Cameron Kiddle, Rob Simmonds