Sciweavers

1413 search results - page 37 / 283
» ideas 2007
Sort
View
WEWORC
2007
129views Cryptology» more  WEWORC 2007»
15 years 1 months ago
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
This paper presents two key-recovery attacks against the last modication to Achterbahn-128/80 proposed by the authors at SASC 2007 due to the previous attacks. The 80-bit variant,...
María Naya-Plasencia
FORTE
2007
15 years 1 months ago
The DHCP Failover Protocol: A Formal Perspective
Abstract. We present a formal specification and analysis of a faulttolerant DHCP algorithm, used to automatically configure certain host parameters in an IP network. Our algorith...
Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy ...
CORR
2007
Springer
123views Education» more  CORR 2007»
14 years 11 months ago
Degrees of Freedom of Wireless X Networks
Abstract— We study the degrees of freedom characterization of wireless X networks, i.e. networks of M distributed single antenna transmitters and N distributed single antenna rec...
Viveck R. Cadambe, Syed Ali Jafar
IJCAI
2001
15 years 1 months ago
The Exponentiated Subgradient Algorithm for Heuristic Boolean Programming
Boolean linear programs (BLPs) are ubiquitous in AI. Satisfiability testing, planning with resource constraints, and winner determination in combinatorial auctions are all example...
Dale Schuurmans, Finnegan Southey, Robert C. Holte
ENTCS
2007
88views more  ENTCS 2007»
14 years 11 months ago
Behavioural Types for Service Integration: Achievements and Challenges
Abstract. Increasing attention is being paid to the development of socalled behavioural types as a means to formally address the problem of ensuring the correct interoperation of s...
Antonio Brogi, Carlos Canal, Ernesto Pimentel