![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
10,683 Result(s)
-
Chapter and Conference Paper
Distributed Supercomputing for Graphics Applications: A Case Study on an Implementation of the Radiosity Approach
Besides the ray tracing technique, the radiosity method is another major approach for global illumination modeling in the field of computer graphics. Since this method needs a huge amount of storage space (bot...
-
Chapter and Conference Paper
Permutation generators of alternating groups
The problem of generation of permutations from small ones is especially important from a cryptographic point of view. This work explores the case This work addresses the design of cryptographic systems using e...
-
Chapter and Conference Paper
The Case of China: General Framework and a Specific Situation
This section is dedicated to the situation of the information systems in China. After an overview on the progress in the development of computer-based retrieval systems over the past ten years and a descriptio...
-
Chapter and Conference Paper
Determining the Needs
This section addresses the first phase of the development of the information systems for SMEs, namely, the analysis of the information needs and user cosiderations.
-
Chapter and Conference Paper
An admission control algorithm for predictive real-time service (extended abstract)
-
Chapter and Conference Paper
Using hammock graphs to eliminate nonstructured branch statements
The detection of parallelism is based on the dependence analysis of the program. One of the key problems is to partition the program into independent subtasks in the presence of control statements (MIMD). In t...
-
Chapter and Conference Paper
Preliminary measurement of the RMTP/RTIP
The Real-time Message Transport Protocol (RMTP) and the Real-Time Internetwork Protocol (RTIP) are the transport and network layer data delivery protocols in the Tenet Protocol Suite. We implemented the protoc...
-
Chapter and Conference Paper
Enhancing parallelism by removing cyclic data dependencies
The parallel execution of loop iterations often is inhibited by recurrence relations on scalar variables. Examples are the use of induction variables and recursive functions. Due to the cyclic dependence betwe...
-
Chapter and Conference Paper
Pitfalls in Designing Substitution Boxes
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biham and Shamir [3] and the linear attack by Matsui [7, 8], have had devastating impact on data encryption algorith...
-
Chapter and Conference Paper
Structures of cryptographic functions with strong avalanche characteristics
This paper studies the properties and constructions of nonlinear functions, which are a core component of cryptographic primitives including data encryption algorithms and one-way hash functions. A main contri...
-
Chapter and Conference Paper
On Nonlinear Resilient Functions
This paper studies resilient functions which have applica- tions in fault-tolerant distributed computing, quantum cryptographic key distribution and random sequence generation for stream ciphers. We present a ...
-
Chapter and Conference Paper
RED-VBR: A new approach to support delay-sensitive VBR video in packet-switched networks
Previous approaches to supporting video on packet-switched networks include deterministic service, statistical service, predicted service, and feedback-based schemes. These schemes represent different tradeoff...
-
Chapter and Conference Paper
Neural network strategies for solving synthesis problems in non-conflict cases in distributed expert systems
In this paper, two neural network mechanisms for synthesis of solutions in non-conflict cases in distributed expert systems (DESs) are proposed. The ideas are: inputs of the neural network are different soluti...
-
Chapter and Conference Paper
Distributed concurrency control in real-time cooperative editing systems
Efficient distributed concurrency control is one of the most significant challenges in building real-time cooperative editing systems. In this paper, we focus on the definition and verification of an integrate...
-
Chapter and Conference Paper
Definition and application of a comprehensive framework for distributed problem solving
In the Distributed Artificial Intelligence community, the term “Distributed Problem Solving (DPS)” is widely used. However, different people refer to different types of DPS frameworks. In this paper, we define...
-
Chapter and Conference Paper
Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions
It is a well known fact that the nonlinearity of a function f on the n-dimensional vector space V n is bounded from above by 2n−1 − 21/2n−1. In cryptographic practice, nonlinear functions are usua...
-
Chapter and Conference Paper
A declustering algorithm for minimising spatial join cost
Spatial joins are important, yet time-consuming operations in spatial databases. In this paper we consider to minimise the I/O cost for the spatial join processing. A graph model is proposed to formalise the c...
-
Chapter and Conference Paper
Many-to-one packet routing via matchings
In this paper we study the packet routing problem under the matching model proposed by Alon, Chung and Graham [1]. We extend the model to allow more than one packet per origin and destination node. We give tig...
-
Chapter and Conference Paper
Rearrangeable graphs
Interconnection networks play an important role in parallel computing systems. A lot of effort has been made to construct rearrangeable networks. This paper generalizes the concept of rearrangeability to gener...
-
Chapter and Conference Paper
Duality of Boolean functions and its cryptographic significance
Recent advances in interpolation and high order differential cryptanalysis have highlighted the cryptographic significance of Boolean functions with a high algebraic degree. However, compared with other nonlin...