This paper presents an approach to the specification of external interfaces of an electronic broker used in the Architecture for Electronic Brokerage systems (AEBS). The external interface specified by the AEBS archit...
详细信息
We design a provably secure public-key encryption scheme based on modular squaring (Rabin’s public-key encryption scheme [28]) over ZN, where N = pdq (p and q are prime integers, and d > 1), and we show that this ...
详细信息
In this work the problem of code synchronization for CDMA cellular networks, such as IS-95 or cdma2000, is addressed. A multi-dwell testing procedure is adopted and optimized in multiple dimensions. The effects of cor...
详细信息
Software has become as essential to molecular biologists as the Bunsen burner was a few decades ago. Biological data come mainly in the form of DNA or protein sequences, i.e., strings over alphabets of four or 20 symb...
详细信息
Over the past decade, clusters of workstations have become widely accepted as a cost efficient way of obtaining computational power. Moreover, clusters have increasingly been used to support multi-application environm...
详细信息
Over the past decade, clusters of workstations have become widely accepted as a cost efficient way of obtaining computational power. Moreover, clusters have increasingly been used to support multi-application environment, such as web servers and application servers, and to concurrently support a number of different services. In such an environment, resources become difficult to manage, e.g., it is difficult to adequately support the varying memory usage requirements of each application with a single strategy. In this paper we propose a policy-based model that provides applications with an interface to the underlying system in order to adapt the behavior of system services at runtime. The use of policies is illustrated by presenting the design of a memory management model for distributed shared memory systems, which allows different memory placement policies, while providing the ability to change consistency and coherency protocols at runtime.
In this paper we present algorithms for model checking CTL over systems specified as Petri nets. We present sequential as well as distributed model checking algorithms. The algorithms rely on an explicit representatio...
In this paper we present algorithms for model checking CTL over systems specified as Petri nets. We present sequential as well as distributed model checking algorithms. The algorithms rely on an explicit representation of the system state space, but do not require the transition relation to be explicitly available; it is recomputed whenever required. This approach allows us to model check very large systems, with hundreds of millions of states, in a fast and efficient way. Furthermore, our distributed algorithms scale very well, as they show efficiencies in the range of 80 to 100%.
In the paper performance evaluation of a differential post detection integration (DPDI) technique for code acquisition in the Return Link of a Satellite CDMA system is carried out in the presence of Rician fading and ...
详细信息
W-CDMA and SW-CDMA air interfaces require that a user equipment in a given cell acquires slot and flame synchronization, and identifies the primary scrambling code used by the target cell before starting communication...
详细信息
In the paper, the preamble structure of IMT-2000 SW-CDMA air radio interface is considered in the evaluation of the performance of different post detection integration techniques for code acquisition in the return lin...
详细信息
暂无评论