![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
2,884 Result(s)
-
Chapter and Conference Paper
A new routing scheme for concatenating two omega networks
A new routing scheme for concatenating two omega networks is presented. Routing the 2log 2 N-stage concatenated network has been an open problem for decades, and no clear solution has yet been proposed. It was sh...
-
Chapter and Conference Paper
A dynamic task allocation scheme in Beneš-type nonblocking networks
Due to the uniqueness of a path between a pair of input/output terminals in cube-type networks, conflicts in the network are the main bottleneck in the performance of a highly-parallel multiprocessor system. In o...
-
Chapter and Conference Paper
Distributed Linda tuplespace algorithms and implementations
Linda, a general purpose coordination language, has been used to make a language parallel. Based on a logically shared tuplespace, Linda poses difficulties to be efficiently implemented on a distributed multip...
-
Chapter and Conference Paper
An application of the saturated attractor analysis to three typical models
The saturated attractor analysis, an approach proposed first in [FP] for a comprehensive study of the dynamics of the Linsker model and then successfully applied to the dynamic link model[FT1], is further deve...
-
Chapter and Conference Paper
Broadcasting in hypercubes with randomly distributed Byzantine faults
We study all-to-all broadcasting in hypercubes with randomly distributed Byzantine faults. We construct an efficient broadcasting scheme BC1-n-cube running on the n-dimensional hypercube (n-cube for short) in 2n ...
-
Chapter
A Diffusion Cell Loss Estimate for ATM with Multiclass Bursty Traffic
We describe a diffusion approximation model for an ATM statistical multiplexer using the instantaneous return model approach (Gelenbe, 1975). Two Cell Loss Estimates are proposed for multiclass traffic. Our ai...
-
Chapter and Conference Paper
Broadcasting in star graphs with Byzantine failures
We study broadcasting in star graphs containing faulty nodes and/or edges of the Byzantine type. We propose a single-port broadcasting scheme that tolerates up to ⌊n−3d−1/2⌋ Byzantine failures in the n-star graph...
-
Chapter and Conference Paper
A new subgraph of minimum weight triangulations
In this paper, two sufficient conditions for identifying a subgraph of minimum weight triangulation of a planar point set are presented. These conditions are based on local geometric properties of an identifyi...
-
Chapter and Conference Paper
Optimal time broadcasting in faulty star networks
This paper investigates fault-tolerant broadcasting in star networks. We propose a non-adaptive single-port broadcasting scheme in the n-star network such that it tolerates n — 2 faults in the worst case and comp...
-
Chapter
NCL: A Common Language for Achieving Rule-Based Interoperability among Heterogeneous Systems
For achieving interoperability among heterogeneous computing systems, the Object Management Group (OMG) has adapted the Common Object Request Broker Architecture (CORBA) and the use of an Interface Definition ...
-
Article
A customer-to-carrier interface for trouble administration
This paper describes a customer-to-carrier trouble administration service based on the Network Management Forum (NMF) service management concept. Implementing a trouble administration gateway for direct on-lin...
-
Book
-
Chapter and Conference Paper
A multiplication-addition structure against differential attack
This paper presents a multiplication-addition structure in finite field that can be used in constructing round fimction F of the Generalized DES-like iterated cipher to strengthen ability against the different...
-
Chapter and Conference Paper
Design and analyses of two basic protocols for use in TTP-based Key escrow
In this paper, we study two basic protocols which are important in realizing TTP-based key escrow systems. A TTP-based key escrow system was studied in [3] under the scenario of multiple domains (e.g., countri...
-
Chapter and Conference Paper
Viewing a class of neurodynamics on parameter space
Nearly all models in neural networks start from the assumption that the input-output characteristic is a sigmoidal function. On parameter space we present a systematic and feasible method for analyzing the who...
-
Chapter and Conference Paper
RSA-type signatures in the presence of transient faults
In this paper, we show that the presence of transient faults can leak some secret information. We prove that only one faulty RSA-signature is needed to recover one bit of the secret key. Thereafter, we extend ...
-
Article
An optimal bandwidth allocation strategy for the delivery of compressed prerecorded video
The transportation of prerecorded, compressed video data without loss of picture quality requires the network and video servers to support large fluctuations in bandwidth requirements. Fully utilizing a c...
-
Chapter
A Manufacturing Planning and Execution Software Integration Architecture
Process planning and manufacturing execution are two major functions in a product development cycle. Industries require these functions to be able to plug and play with other related manufacturing applications...
-
Chapter and Conference Paper
Detection of Races and Control-Flow Nondeterminism
When either of two concurrent accesses of the same data is not in its critical section, a “race condition” occurs. Previous race-detection techniques are only applicable to parallel programs without using crit...
-
Chapter and Conference Paper
A signcryption scheme with signature directly verifiable by public key
Signcryption, first proposed by Zheng [4, 5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step, and with a computational co...