Sciweavers

134 search results - page 26 / 27
» A note on generalized chromatic number and generalized girth
Sort
View
ACSAC
2001
IEEE
13 years 9 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
ELPUB
2008
ACM
13 years 7 months ago
Open Access Citation Rates and Developing Countries
Academics, having written their peer reviewed articles, may at some stage in the make their work Open Access (OA). They can do this by self-archiving an electronic version of thei...
Michael Norris, Charles Oppenheim, Fytton Rowland
ESANN
2006
13 years 7 months ago
Dynamical reservoir properties as network effects
It has been proposed that chaos can serve as a reservoir providing an infinite number of dynamical states [1, 2, 3, 4, 5]. These can be interpreted as different behaviors, search a...
Carlos Lourenço
WCE
2007
13 years 6 months ago
On the Statistical Distribution of Stationary Segment Lengths of Road Vehicles Vibrations
— This paper presents an important outcome of a research programme which focuses on the development of a method for synthesizing, under controlled conditions in the laboratory, t...
Vincent Rouillard
SIGMETRICS
2000
ACM
144views Hardware» more  SIGMETRICS 2000»
13 years 5 months ago
Bistro: a framework for building scalable wide-area Upload applications
Hot spots are a major obstacle to achieving scalability in the Internet. At the application layer, hot spots are usually caused by either (a) high demand for some data or (b) high...
Samrat Bhattacharjee, William C. Cheng, Cheng-Fu C...