نتایج جستجو برای: route

تعداد نتایج: 68491  

Journal: :Computer Networks 2014
Caroline Battaglia Véronique Bruyère Olivier Gauwin Cristel Pelsser Bruno Quoitin

The Border Gateway Protocol (BGP) is the protocol used to distribute Internet routes between different organizations. BGP routing policies are very important because they enable organizations to enforce their business relationships by controlling route redistribution and route selection. In this paper, we investigate the semantic of BGP policies. We aim to determine whether two policies are equ...

Journal: :IACR Trans. Symmetric Cryptol. 2017
Dhiman Saha Sukhendu Kuila Dipanwita Roy Chowdhury

In this work we show the existence of special sets of inputs for which the sum of the images under SHA3 exhibits a symmetric property. We develop an analytical framework which accounts for the existence of these sets. The framework constitutes identification of a generic property of iterated SPN based functions pertaining to the round-constant addition and combining it with the notion of m−fold...

Journal: :Softw., Pract. Exper. 2003
Harold W. Thimbleby

The Chinese Postman Problem has many applications, including robot exploration, and analysing interactive system and web site usability. This paper reviews the wide range of applications of the problem and presents complete, executable code to solve it for the case of directed multigraphs. A variation called the ‘open Chinese Postman Problem’ is also introduced and solved. Although optimisation...

2003
Toshiyuki Shibuya Rajeev Murgai Tadashi Konno Kazuhiro Emi Kaoru Kawamura

In this paper, we propose a new physical synthesis methodology, PDL, which relaxes the timing constraints to obtain best optimality in terms of layout quality and timing quality. It provides a common database for delay calculation, logic optimization, placement, and routing tools so that they can work and interact closely. We present results on industrial circuits showing the efficacy of this m...

2008
Lynette Melnar Chen Liu

In this paper we describe an approach that both creates crosslingual acoustic monophone model sets for speech recognition tasks and objectively predicts their performance without target-language speech data or acoustic measurement techniques. This strategy is based on a series of linguistic metrics characterizing the articulatory phonetic and phonological distances of target-language phonemes f...

2010
Marcia L. Brackbill Katherine L. Bidwell Donald F. Brophy

October 2010 his monthly review of select articles has been compiled and prepared as a service to the members of the Clinical Pharmacy and Pharmacology (CPP) Section of the Society of Critical Care Medicine (SCCM). The content below is for information purposes only and is intended to highlight recent articles that may be of interest to the CPP membership. Though some core content from the publi...

2011
Aaron Roth

We'll recall (again) some definitions from last time: Definition 1 (Database Update Sequence) Let D ∈ N |X | be any database and let Using the exponential mechanism as a distinguisher, we proved the following utility theorem about the IC mechanism: Theorem 3 Given a B(α)-DUA, the Iterative Construction mechanism is (α, β) accurate and-differentially private for: α ≥ 8B(α/2) nn log C γ and (, δ)...

2007
Charles J. Alpert Chris Chu Paul G. Villarrubia

Physical synthesis, the integration of logic synthesis with physical design information, was born in the mid to late 1990s, which means it is about to enter its teenage years. Today, physical synthesis tools are a major part of the EDA industry, accounting for hundreds of millions of dollars in revenue. This work looks at how technology and design trends have affected physical synthesis over th...

Journal: :IACR Cryptology ePrint Archive 2010
Shengbao Wu Mingsheng Wang Zheng Yuan

An distinguisher was constructed by utilizing a 2-round collision differential path of ALPHA-MAC, with about 2 chosen messages and 2 queries. Then, this distinguisher was used to recover the internal state([1],[2]). However, a flaw is found in the internal state recovery attack. The complexity of recovering the internal state is up to 2 exhaustive search. And the complexity of the whole attack ...

Journal: :IEEJ Transactions on Industry Applications 1996

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید