• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 104,175
Next 10 →

Table 2. Cryptanalytic results on SAFER K/SK.

in Linear Cryptanalysis of Non Binary Ciphers with an Application to SAFER
by Thomas Baignères, Jacques Stern, Serge Vaudenay
"... In PAGE 17: ... When studying the average complexity of our attack, we further assume that these subkeys are randomly picked with uniform distribution. Previous Cryptanalysis (see Table2 ). Known attacks against SAFER are summarized in Table 2.... In PAGE 17: ... Previous Cryptanalysis (see Table 2). Known attacks against SAFER are summarized in Table2 . The resistance of SAFER against differential cryptanaly- sis [5] was extensively studied by Massey in [32], where it is argued that 5 rounds are sufficient to resist to this attack.... ..."

Table 1. Performance Characteristics of Different AM Implementations

in Enabling a PC Cluster for High-Performance Computing
by Hermann Hellwagner, Wolfgang Karl, Markus Leberecht, Technische Universitt Mnchen 1997
"... In PAGE 7: ...ficient, buffered writes in the SCI DSM only. Performance measurements on the UCSB SCI cluster show competitive performance behavior of the SCI AM system ( Table1 ). Our own implementation, depicted in the first row of Table 1, adds little over- head to the raw latency of 9.... ..."
Cited by 13

Table 3: The results of a comparative study showing the importance of integrating the two techniques of linearization and con uent inference

in Efficient Connectionist Representations of Syntactic Parse Trees for Grammatical Inference
by Kei Shiu Edward Ho,, Lai Wan Chan
"... In PAGE 9: ... Three prototype parsers were constructed. They are derivatives of CPP but omitting one or both of the two techniques (see Table3 ). They were trained separately on parsing the same set of 80 complete sentences used in Section 4.... In PAGE 10: ...1. The results are then compared against those obtained by CPP1 and CPP2, as summarized in Table3 . Also shown are the lengths of the coding used to represent the various types of data structures.... In PAGE 10: ... They are in fact determined by trial-and-error. For each model, di erent lengths of representations were tried and the optimal result (that is, best generalization) is shown in Table3 . As revealed by the results, linearization plays a more e ective role in promoting the generalization performance.... ..."

Table 3: The results of a comparative study showing the importance of integrating the two techniques of linearization and con uent inference

in Efficient Connectionist Representations of Syntactic Parse Trees for Grammatical Inference
by Kei Shiu Edward Ho, Chan Lai Wan
"... In PAGE 9: ... Three prototype parsers were constructed. They are derivatives of CPP but omitting one or both of the two techniques (see Table3 ). They were trained separately on parsing the same set of 80 complete sentences used in Section 4.... In PAGE 10: ...1. The results are then compared against those obtained by CPP1 and CPP2, as summarized in Table3 . Also shown are the lengths of the coding used to represent the various types of data structures.... In PAGE 10: ... They are in fact determined by trial-and-error. For each model, di erent lengths of representations were tried and the optimal result (that is, best generalization) is shown in Table3 . As revealed by the results, linearization plays a more e ective role in promoting the generalization performance.... ..."

Table 8: Comparison of the four procedures.

in A Procedure For Optimizing Tactical Response In Oil Spill Clean Up Operations
by Anand V. Srinivasa, Wilbert E. Wilhelm
"... In PAGE 21: ... The run times (in seconds) for obtaining IP optimal solutions are also shown. Table8... In PAGE 22: ...developed by Wilhelm and Srinivasa (1994) and with the OSL branch and bound solver applied directly to each problem. The run times in Table8 are all in seconds. Results show that the aggregation scheme is successful, not only in improving bounds from the LP relaxation, but also in finding optimal integral solutions within reasonable times.... ..."

Table 3: Overheads of primitive operations in TinyOS

in System architecture directions for networked sensors
by Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, Kristofer Pister 2000
"... In PAGE 11: ... In this context, an important baseline characteristic of a network sensor is its context switch speed. Table3 shows this aspect calibrated against the intrinsic hardware cost for moving bytes in memory. The cost of propagating an event is roughly equivalent to that of copying one byte of data.... In PAGE 11: ... Projects such as paths, in Scout [36], and stackable systems [29, 25, 24] have had similar goals in other regimes. Table3 gives the cost of individual component crossing, while Figure 4 shows the dynamic composition of these crossings. It contains a timing diagram from a logic analyzer of an event chain that ows through the system at the completion of a radio transmission.... ..."
Cited by 998

Table 3: Overhead of primitive operations in TinyOS

in System Architecture Directions for Networked Sensors
by Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, Kristofer Pister 2000
"... In PAGE 7: ... In this context, an important baseline characteristic of a network sensor is its context switch speed. Table3 shows this aspect calibrated against the intrinsic hardware cost for moving bytes in memory. The cost of propagating an event is roughly equivalent to that of copying one byte of data.... In PAGE 9: ... Projects such as paths, in Scout [35], and stackable systems [29, 25, 24] have had similar goals in other regimes. Table3 gives the cost of individual compo- nent crossing, while Figure 4 shows the dynamic composition of these crossings. It contains a timing diagram from a logic analyzer of an event chain that ows through the system at the completion of a radio transmission.... ..."
Cited by 998

Table 3: Overheads of primitive operations in TinyOS

in System Architecture Directions for Networked Sensors
by Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, Kristofer Pister 2000
"... In PAGE 11: ... In this context, an important baseline characteristic of a network sensor is its context switch speed. Table3 shows this aspect calibrated against the intrinsic hardware cost for moving bytes in memory. The cost of propagating an event is roughly equivalent to that of copying one byte of data.... In PAGE 11: ... Projects such as paths, in Scout [36], and stackable systems [29, 25, 24] have had similar goals in other regimes. Table3 gives the cost of individual component crossing, while Figure 4 shows the dynamic composition of these crossings. It contains a timing diagram from a logic analyzer of an event chain that ows through the system at the completion of a radio transmission.... ..."
Cited by 998

TABLE III SIX AND TEN SOURCE DEMIXING PERFORMANCE. PERFORMANCE OF THE BLIND TECHNIQUE IS COMPARED AGAINST THE OPTIMAL

in Blind separation of speech mixtures via time-frequency masking
by Özgür Yılmaz, Scott Rickard 2004
Cited by 52

Table 2. Proof System

in A decidable fragment of separation logic
by Josh Berdine, Cristiano Calcagno, Peter W. O’hearn 2004
"... In PAGE 8: ... We now see that it also forms the basis of a sound and complete proof theory, and a decision procedure based on proof-search. The rules of the proof system are shown in Table2 . Since there is no Cut rule, the rules have a rather odd form.... ..."
Cited by 34
Next 10 →
Results 11 - 20 of 104,175
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University