Sciweavers

CJ
2002
81views more  CJ 2002»
13 years 4 months ago
A Multi-channel MAC Protocol with Power Control for Multi-hop Mobile Ad Hoc Networks
Shih-Lin Wu, Yu-Chee Tseng, Chih-Yu Lin, Jang-Ping...
CJ
2002
81views more  CJ 2002»
13 years 4 months ago
Lower Bounds for One-to-one Packet Routing on Trees using Hot-Potato Algorithms
Alan Roberts, Antonios Symvonis, David R. Wood
CJ
2002
61views more  CJ 2002»
13 years 4 months ago
RASCAL: Calculation of Graph Similarity using Maximum Common Edge Subgraphs
John W. Raymond, Eleanor J. Gardiner, Peter Willet...
CJ
2002
70views more  CJ 2002»
13 years 4 months ago
Formal Methods for Assuring Security of Protocols
l examination of the underlying assumptions, abstractions, and possible actions. Consequently, assuring that a system behaves securely is virtually impossible without the use of ri...
Susan Older, Shiu-Kai Chin
CJ
2002
73views more  CJ 2002»
13 years 4 months ago
A Thread of HOL Development
Michael Norrish, Konrad Slind
CJ
2002
67views more  CJ 2002»
13 years 4 months ago
Using Bloom Filters to Speed-up Name Lookup in Distributed Systems
Bloom filters make use of a "probabilistic" hash-coding method to reduce the amount of space required to store a hash set. A Bloom filter offers a trade-off between its ...
Mark C. Little, Santosh K. Shrivastava, Neil A. Sp...
CJ
2002
65views more  CJ 2002»
13 years 4 months ago
Reverse Execution of Java Bytecode
Jonathan J. Cook
CJ
2002
65views more  CJ 2002»
13 years 4 months ago
Report on the EFIS 2001 Workshop
Stefan Conrad, Wilhelm Hasselbring, Anne E. James,...