Sciweavers

11 search results - page 1 / 3
» Isolated Toughness and Existence of f -Factors
Sort
View
JGT
2008
61views more  JGT 2008»
13 years 5 months ago
Irregularity strength of dense graphs
Let G be a simple graph of order n with no isolated vertices and no isolated edges. For a positive integer w, an assignment f on G is a function f : E(G) {1, 2, . . . , w}. For a ...
Bill Cuckler, Felix Lazebnik
BMCBI
2008
83views more  BMCBI 2008»
13 years 5 months ago
Models of deletion for visualizing bacterial variation: an application to tuberculosis spoligotypes
Background: Molecular typing methods are commonly used to study genetic relationships among bacterial isolates. Many of these methods have become standardized and produce portable...
Josephine F. Reyes, Andrew R. Francis, Mark M. Tan...
IEEEARES
2006
IEEE
13 years 11 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
SOSP
2003
ACM
14 years 2 months ago
Improving the reliability of commodity operating systems
Despite decades of research in extensible operating system technology, extensions such as device drivers remain a significant cause of system failures. In Windows XP, for example,...
Michael M. Swift, Brian N. Bershad, Henry M. Levy
SCAM
2008
IEEE
13 years 11 months ago
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code
—More and more current software systems rely on non trivial coordination logic for combining autonomous services typically running on different platforms and often owned by diffe...
Nuno F. Rodrigues, Luís Soares Barbosa