Search

Showing total 1,662 results

Search Constraints

Start Over You searched for: Topic algorithm analysis and problem complexity Remove constraint Topic: algorithm analysis and problem complexity Topic operating systems Remove constraint Topic: operating systems Publication Type Books Remove constraint Publication Type: Books Publisher springer nature Remove constraint Publisher: springer nature
1,662 results

Search Results

1. Number of Processors with Partitioning Strategy and EDF-Schedulability Test: Upper and Lower Bounds with Comparison.

2. Gathering Autonomous Mobile Robots with Dynamic Compasses: An Optimal Result.

3. A Study of Detection Method of Printed Image Alteration Using Digital Watermark.

4. An Evaluation Towards Automatically Tuned Eigensolvers.

5. Secure Quantization Index Modulation Watermark Detection.

6. On the System Performance vs. User Movement with Systematic Simulation in Mobile Cellular Networks.

7. Low Latency Vertical Handover Using MIH L2-Trigger Algorithm in Mobile IP Networks.

8. Reference Architectural Styles for Service-Oriented Computing.

9. Compact Separator Decompositions in Dynamic Trees and Applications to Labeling Schemes.

10. An Efficient Probabilistic Packet Marking Scheme (NOD-PPM).

11. The Influence of Interference Networks in QoS Parameters in a WLAN 802.11g Environment.

12. On the Optimality of Rollback-Recovery Protocol Preserving Session Guarantees.

13. Performance and Complexity Analysis of Credit-Based End-to-End Flow Control in Network-on-Chip.

14. A Hierarchical Programming Model for Large Parallel Interactive Applications.

15. HPRD: A High Performance RDF Database.

16. Link Protocol Based on DS-CDMA with MUD for Decentralized All-Connected Wireless Network.

17. On the Routing Algorithms for Optical Multi-log2N Networks.

18. Differential Properties of Elliptic Curves and Blind Signatures.

19. On the Concept of Software Obfuscation in Computer Security.

20. Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.

21. Energy and Time Efficient Broadcasting in Known Topology Radio Networks.

22. Output Stability Versus Time Till Output.

23. On the Communication Surplus Incurred by Faulty Processors.

24. Experiments on the Linear Algebra Step in the Number Field Sieve.

25. A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.

26. Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.

27. Pseudonymity in the Light of Evidence-Based Trust.

28. BLIND: A Complete Identity Protection Framework for End-Points.

29. Toward a Broader View of Security Protocols (Transcript of Discussion).

30. Limits to Anonymity When Using Credentials.

31. Cheating Immune (2,n)-Threshold Visual Secret Sharing.

32. Taking into Account the Third Kind Conditions in Weight Estimates for Difference Schemes.

33. Data Reduction Schemes in Davidson Subspace Diagonalization for MR-CI.

34. Ant Algorithm for Grid Scheduling Problem.

35. Formalising Receipt-Freeness.

36. Simulation of Internet DDoS Attacks and Defense.

37. Credit Transfer for Market-Based Infrastructure.

38. Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition.

39. Multi Bit Plane Image Steganography.

40. Volunteer Computing on Clusters.

41. Advance Reservation Policies for Workflows.

42. KSEQ: A New Scalable Synchronous I/O Multiplexing Mechanism for Event-Driven Applications.

43. Qos Provisioning in Mobile Networks Based on Aggregate Bandwidth Reservation.

44. Design and Analysis of Multicast Communication in Multidimensional Mesh Networks.

45. A Hierarchical Care-of Prefix with BUT Scheme for Nested Mobile Networks.

46. A Clustering-Based Channel Assignment Algorithm and Routing Metric for Multi-channel Wireless Mesh Networks.

47. Dynamic Handover Mechanism Using Mobile SCTP in Contention Based Wireless Network.

48. Implementing IPv4+4 Addressing Architecture with IPv4 LSRR Option for Seamless Peer-to-Peer (P2P) Communication.

49. Strategies for Traffic Grooming over Logical Topologies.

50. Hamiltonicity and Pancyclicity of Binary Recursive Networks.