نتایج جستجو برای: stream length

تعداد نتایج: 362831  

2015
Priya Nagar Bhabani P. Sinha

RC4 Stream cipher is well known for its simplicity and ease to develop in software. But here, in the proposed design we have heighlighted the modified hardware implémentation of RC4. As RC4 is the most popular stream cipher. The proposed design performs reading and swapping simultaneously in one clock cycle. The proposed design also highlights the adder part which enhances the architecture spee...

2005
Tadeusz FLEITUCH Antoni AMIROWICZ Tadeusz Fleituch Antoni Amirowicz

A natural reach of montane stream (length 96 m and 7 m width) was grided into 150 cells (2 × 2 m). Density and biomass of fish (Salmo trutta L. and Cottus poecilopus Heckel) were estimated at each cell, as well as stream depth, current velocity, Froude number, bed granulation and its roughness were measured, and benthic samples from exposed bricks were collected from mid August to early October...

2014
Nathanaël François Rahul Jain Frédéric Magniez

We consider unidirectional data streams with restricted access, such as read-only and write-only streams. For read-write streams, we also introduce a new complexity measure called expansion, the ratio between the space used on the stream and the input size. We give tight bounds for the complexity of reversing a stream of length n in several of the possible models. In the read-only and write-onl...

2013

1. Summary. The paper proposes a novel streaming algorithm to mine the top-k episodes in a stream of events. The frequency of the episodes is computed over a sliding window which length is defined by the user. The key idea in this paper is based on two new concepts related to the stream: maximum rate of change and top-k separation. The sliding window is decomposed into batches and the previous ...

2007
R. I. Balay A. A. Nilsson Rajesh I. Balay N.C Arne A. Nilsson Meejeong Lee

This paper analyzes a discrete-time, finite capacity, deterministic service time queueing system (MMBP + Ml\!fBP(XljD(N)jljK) with superposing non-renewal arrival processes. This queueing system models a switch in high speed networks, where multiple applications which generate correlated and bursty traffic are supported simultaneously using fast packet switching. A designated arrival stream (VC...

2013
Andrew J. Elmore Jason P. Julian Steven M. Guinn Matthew C. Fitzpatrick

Stream network density exerts a strong influence on ecohydrologic processes in watersheds, yet existing stream maps fail to capture most headwater streams and therefore underestimate stream density. Furthermore, discrepancies between mapped and actual stream length vary between watersheds, confounding efforts to understand the impacts of land use on stream ecosystems. Here we report on research...

2013
Chris B. Graham Holly R. Barnard Kathleen L. Kavanagh James P. McNamara

Diel fluctuations can comprise a significant portion of summer discharge in small to medium catchments. The source of these signals and the manner in which they are propagated to stream gauging sites is poorly understood. In this work, we analysed stream discharge from 15 subcatchments in Dry Creek, Idaho, Reynolds Creek, Idaho, and HJ Andrews, Oregon. We identified diel signals in summer low f...

Journal: :CoRR 2009
Jörg Endrullis Dimitri Hendriks Jan Willem Klop

We study the behaviour of iterations of the difference operator δ on streams over {0, 1}. In particular, we show that a stream σ is eventually periodic if and only if the sequence of differences σ, δ(σ), δ(σ), . . ., the ‘δorbit’ of σ as we call it, is eventually periodic. Moreover, we generalise this result to operations δd that sum modulo 2 the elements of each consecutive block of length d +...

Journal: :I. J. Network Security 2013
Monjur Alam Sonai Ray

The paper puts forward the design of an intelligent SHA-1 based crypto system. For a given 512-bit message stream the intelligence of the system lies in its power of predicting the probable-colluders. Along with the conventional SHA-1 architecture, our scheme employs a predictor control block which takes the message stream from the user, and provides the log-list of the equal length bit-streams...

2006
Guibin Zheng Jiqing Han

This study presents a robust audio retrieval method and discusses its control strategy. In the method, the retrieval target is divided into short segments, each segment is searched respectively and a retrieval window is used to maintain a list of segments that can be searched simultaneously. The method can quickly detect and locate known sound in real-time audio stream, multimedia archives or t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید