Sciweavers

642 search results - page 69 / 129
» corr 2006
Sort
View
CORR
2006
Springer
98views Education» more  CORR 2006»
15 years 17 days ago
Reversal Complexity Revisited
We study a generalized version of reversal bounded Turing machines where, apart from several tapes on which the number of head reversals is bounded by r(n), there are several furth...
André Hernich, Nicole Schweikardt
CORR
2006
Springer
91views Education» more  CORR 2006»
15 years 17 days ago
Improved results for a memory allocation problem
We consider a memory allocation problem. This problem can be modeled as a version of bin packing where items may be split, but each bin may contain at most two (parts of) items. T...
Leah Epstein, Rob van Stee
80
Voted
CORR
2006
Springer
80views Education» more  CORR 2006»
15 years 17 days ago
Exact Failure Frequency Calculations for Extended Systems
This paper shows how the steady-state availability and failure frequency can be calculated in a single pass for very large systems, when the availability is expressed as a product...
Annie Druault-Vicard, Christian Tanguy
89
Voted
CORR
2006
Springer
123views Education» more  CORR 2006»
15 years 17 days ago
Directed animals in the gas
In this paper, we revisit the enumeration of directed animals using gas models. We show that there exists a natural construction of random directed animals on any directed graph t...
Yvan Le Borgne, Jean-François Marckert
99
Voted
CORR
2006
Springer
115views Education» more  CORR 2006»
15 years 17 days ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski