1. Trang chủ
  2. » Cao đẳng - Đại học

handbook of applied algorithms solving scientific engineering and practical problems

571 437 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 571
Dung lượng 32,4 MB

Nội dung

[...]... it takes θ(n) time to produce a string Handbook of Applied Algorithms: Solving Scientific, Engineering and Practical Problems Edited by Amiya Nayak and Ivan Stojmenovi´ Copyright © 2008 John Wiley & Sons, Inc c 1 2 GENERATING ALL AND RANDOM INSTANCES OF A COMBINATORIAL OBJECT Let P be the number of all instances of a combinatorial object, and N be the average size of an instance The delay when generating... simulation and system level performance analysis He has been an Adjunct Research Professor in the School of Computer Science at Carleton University since 1994 He had been the Book Review and Canadian Editor of VLSI Design from 1996 till 2002 He is in the Editorial Board of International Journal of Parallel, Emergent and Distributed Systems, and the Associate Editor of International Journal of Computing and. .. stands out as the predominant concept of rationality in noncooperative settings Thus, game theory and its notions of equilibria provide a rich framework for modeling the behavior of PREFACE xi selfish agents in these kinds of distributed and networked environments and offering mechanisms to achieve efficient and desirable global outcomes in spite of the selfish behavior In Chapter 10, we review some of. .. the journal Communications of ACM (between 1960 and 1975) and later in ACM Transactions of Mathematical Software and Collected Algorithms from ACM, in addition to hundreds of other journal publications The generation of ranking and unranking combinatorial objects has been surveyed in several books [6,14,21,25,30,35,40] 1.2 LISTING SUBSETS AND INTEGER COMPOSITIONS Without loss of generality, the combinatorial... topology of the network and contributes to maintaining high bandwidth utilization Our bandwidth allocation scheme is specifically tailored to meet the QoS needs of multimedia connections The performance of RADAR is compared to that of three recent schemes proposed in the literature Simulation results show that our scheme offers low call dropping probability, providing for reliable handoff of on-going... Science and Combinatorics and Optimization from University of Waterloo in 1981, and Ph.D in Systems and Computer Engineering from Carleton University in 1991 He has over 17 years of industrial experience, working at CMC Electronics (formerly known as Canadian Marconi Company), Defence Research Establishment Ottawa (DREO), EER Systems and Nortel Networks, in software engineering, avionics, and navigation... quality of this handbook The assistance of reviewers for all chapters is also greatly appreciated The University of Ottawa (with the help of NSERC) provided an ideal working environment for the preparation of this handbook This includes computer facilities for efficient Internet search, communication by electronic mail, and writing our own contributions The editors are thankful to Paul Petralia and Whitney... States, Canada, France, and Mexico He is currently a Chair Professor in Applied Computing at EECE, the University of Birmingham, UK He published over 200 different papers, and edited three books on wireless, ad hoc, and sensor networks with Wiley/IEEE He is currently editor of over ten journals, and founder and editor-in-chief of three journals Stojmenovic was cited >3400 times and is in the top 0.56%... 1 Generating All and Random Instances of a Combinatorial Object IVAN STOJMENOVIC 1.1 LISTING ALL INSTANCES OF A COMBINATORIAL OBJECT The design of algorithms to generate combinatorial objects has long fascinated mathematicians and computer scientists Some of the earliest papers on the interplay between mathematics and computer science are devoted to combinatorial algorithms Because of its many applications... BACKTRACKING AND ISOMORPH-FREE GENERATION OF POLYHEXES General combinatorial algorithms and their application to enumerating molecules in chemistry are presented and classical and new algorithms for the generation of complete lists of combinatorial objects that contain only inequivalent objects (isomorphfree exhaustive generation) are discussed We introduce polygonal systems, and how polyhexes and hexagonal . y0 w0 h0" alt="" HANDBOOK OF APPLIED ALGORITHMS HANDBOOK OF APPLIED ALGORITHMS SOLVING SCIENTIFIC, ENGINEERING AND PRACTICAL PROBLEMS Edited by Amiya Nayak SITE, University of Ottawa Ottawa,. Cataloging-in-Publication Data: Handbook of applied algorithms: solving scientific, engineering, and practical problem / edited by Amiya Nayak & Ivan Stojmenovic. p. cm. ISBN 978-0-470-04492-6 1. Computer algorithms. . interested in some applied and complementary aspects of their activity, and people that want to approach and get a general view of this area. Applied algorithms are gaining popularity, and a textbook

Ngày đăng: 03/07/2014, 16:10

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
1. Biham E, Duneklman O. Cryptanalysis of the A5/1 GSM stream cipher. Progress in Cryptology—INDOCRYPT 2000. Lecture Notes in Computer Science. Volume 1977.Springer-Verlag; 2000. p 43–51 Sách, tạp chí
Tiêu đề: Cryptanalysis of the A5/1 GSM stream cipher
Tác giả: Biham E, Duneklman O
Nhà XB: Springer-Verlag
Năm: 2000
2. Biryukov A, Shamir A, Wagner D. Real time cryptanalysis of A5/1 on a PC. Fast Software Encryption—FSE 2000. Lecture Notes in Computer Science. Volume 1978. Springer- Verlag; 2000. p 1–13 Sách, tạp chí
Tiêu đề: Real time cryptanalysis of A5/1 on a PC
Tác giả: Biryukov A, Shamir A, Wagner D
Nhà XB: Springer- Verlag
Năm: 2000
8. Colbourn CJ, Dinitz JH. The CRC Handbook of Combinatorial Designs. Boca Raton: CRC Press; 1996 Sách, tạp chí
Tiêu đề: The CRC Handbook of Combinatorial Designs
Tác giả: Colbourn CJ, Dinitz JH
Nhà XB: CRC Press
Năm: 1996
9. Deb B, Bhatnagar S, Nath B. RelnForM: reliable information forwarding using multiple paths in sensor networks. Proceedings of 28th Annual IEEE International Conference on Local Computer Networks (LCN ’03); October, 2003; p 406–415 Sách, tạp chí
Tiêu đề: RelnForM: reliable information forwarding using multiple paths in sensor networks
Tác giả: Deb B, Bhatnagar S, Nath B
Nhà XB: Proceedings of 28th Annual IEEE International Conference on Local Computer Networks (LCN ’03)
Năm: 2003
15. Eisentr¨ager K, Lauter K, Montgomery PL. Improved Weil and Tate pairings for elliptic and hyperelliptic curves. Algorithmic Number Theory, 6th International Symposium, ANTSVI, Burlington, VT, USA, June 13–18, 2004. Lecture Notes in Computer Science. Volume 3076. Springer-Verlag; 2004. p 169–183 Sách, tạp chí
Tiêu đề: Improved Weil and Tate pairings for elliptic and hyperelliptic curves
Tác giả: Eisenträger K, Lauter K, Montgomery PL
Nhà XB: Lecture Notes in Computer Science
Năm: 2004
16. Fluhrer SR, Lucks S. Analysis of E 0 encryption system. Selected Areas in Cryptology—SAC 2001. Lecture Notes in Computer Science. Volume 2259. Springer-Verlag; 2001 Sách, tạp chí
Tiêu đề: Analysis of E 0 encryption system
Tác giả: Fluhrer SR, Lucks S
Nhà XB: Springer-Verlag
Năm: 2001
18. Golic JD. Cryptanalysis of alleged A5 stream cipher. Advances of Cryptology—EUROCRYPT’97. Lecture Notes in Computer Science. Volume 1233. Springer-Verlag;1997. p 239–255 Sách, tạp chí
Tiêu đề: Cryptanalysis of alleged A5 stream cipher
Tác giả: Golic JD
Nhà XB: Springer-Verlag
Năm: 1997
19. Golic JD, Bagini V, Morgari G. Linear cryptanalysis of Bluetooth stream cipher. Advances in Cryptology—EUROCRYPT 2002. Lecture Notes in Computer Science. Volume 2332.Springer-Verlag 2002. p 238–255 Sách, tạp chí
Tiêu đề: Advances in Cryptology—EUROCRYPT 2002
Tác giả: Golic JD, Bagini V, Morgari G
Nhà XB: Springer-Verlag
Năm: 2002
20. Gura N, Patel A, Wander A, Eberle H, Shantz SC. Comparing elliptic curve cryptography and RSA on 8-bit CPUs, CHES, 2004. Lecture Notes in Computer Science. Volume 3156.Springer-Verlag; 2004. p 119–132 Sách, tạp chí
Tiêu đề: Comparing elliptic curve cryptography and RSA on 8-bit CPUs
Tác giả: Gura N, Patel A, Wander A, Eberle H, Shantz SC
Nhà XB: Springer-Verlag
Năm: 2004
23. Hermelin M, Nyberg K. Correlation properties of Bluetooth combiner. Information Se- curity and Cryptology—ICISC’99. Lecture Notes in Computer Science. Volume 1787.Springer-Verlag; 2000. p 17–29 Sách, tạp chí
Tiêu đề: Correlation properties of Bluetooth combiner
Tác giả: Hermelin M, Nyberg K
Nhà XB: Springer-Verlag
Năm: 2000
25. Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and counter- measures. Elsevier’s Ad Hoc Netw J (Special Issue on Sensor Network Applications and Protocols) 2003;1(2–3):293–315 Sách, tạp chí
Tiêu đề: Secure routing in wireless sensor networks: attacks and counter- measures
Tác giả: Karlof C, Wagner D
Nhà XB: Elsevier’s Ad Hoc Netw J
Năm: 2003
28. Lee J, Stinson D. A combinatorial approach to key pre-distribution for distributed sensor networks. IEEE Wireless Computing and Networking Conference (WCNC 2005); New Orleans, LA, USA; 2005 Sách, tạp chí
Tiêu đề: A combinatorial approach to key pre-distribution for distributed sensor networks
Tác giả: Lee J, Stinson D
Nhà XB: IEEE Wireless Computing and Networking Conference (WCNC 2005)
Năm: 2005
31. Manulis M. Contributory group key agreement protocols, revisited for mobile ad hoc groups. Proceedings of the MASS; 2005 Sách, tạp chí
Tiêu đề: Contributory group key agreement protocols, revisited for mobile ad hoc groups
Tác giả: Manulis M
Nhà XB: Proceedings of the MASS
Năm: 2005
32. Maximov A. Cryptanalysis of the “Grain” family of stream ciphers. ACM Symposium on Information, Computation and Communications Security (ASI–ACCS ’06); 2006. p 283–288 Sách, tạp chí
Tiêu đề: Grain
34. Newsome J, Shi E, Song D, Perrig A. The Sybil attack in sensor networks: analysis and defenses. Proceedings of the IEEE International Conference on Information Processing in Sensor Networks; April 2004 Sách, tạp chí
Tiêu đề: The Sybil attack in sensor networks: analysis and defenses
Tác giả: Newsome J, Shi E, Song D, Perrig A
Nhà XB: Proceedings of the IEEE International Conference on Information Processing in Sensor Networks
Năm: 2004
38. Przydatek B, Song D, Perrig A. SIA: security information aggregation in sensor networks.Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems; 2003. p 255–265 Sách, tạp chí
Tiêu đề: SIA: security information aggregation in sensor networks
Tác giả: Przydatek B, Song D, Perrig A
Nhà XB: Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems
Năm: 2003
42. Stinson D. Combinatorial Designs: Constructions and Analysis. New York: Springer; 2003 Sách, tạp chí
Tiêu đề: Combinatorial Designs: Constructions and Analysis
Tác giả: Stinson D
Nhà XB: Springer
Năm: 2003
47. SIG Bluetooth. Bluetooth specification. Available at http://www.bluetooth.com (accessed on Aug 25, 2006) Sách, tạp chí
Tiêu đề: Bluetooth specification
Tác giả: SIG Bluetooth
Năm: 2006
3. Blom R. An optimal class of symmetric key generation systems. Proceedings of Eurocrypt 1984; LNCS. Volume 209. 1985. p 335–338 Khác
4. Boyd C, Gonz´alez Nieto JM. Round-optimal contributory conference key agreement.Public Key Cryptography, PKC 2003. Lecture Notes in Computer Science. Volume 2567.Springer-Verlag; 2003. p 161–174 Khác

TỪ KHÓA LIÊN QUAN