Sciweavers

FUIN
2010
101views more  FUIN 2010»
13 years 1 months ago
Infinite Product of Traces Represented by Projections
The construction of an associative -product of traces from an earlier paper is revisited using projection representation of traces. Using projections instead of trace prefixes res...
Roman R. Redziejowski
EJC
2007
13 years 4 months ago
The structure of the 3-separations of 3-connected matroids II
The authors showed in an earlier paper that there is a tree that displays, up to a natural equivalence, all non-trivial 3-separations of a 3-connected matroid. The purpose of this ...
James G. Oxley, Charles Semple, Geoff Whittle
MOC
2002
71views more  MOC 2002»
13 years 4 months ago
On a problem of Byrnes concerning polynomials with restricted coefficients, II
As in the earlier paper with this title, we consider a question of Byrnes concerning the minimal length N(m) of a polynomial with all coeffi
David W. Boyd
AUTOMATICA
2004
87views more  AUTOMATICA 2004»
13 years 4 months ago
Exponential stabilization of the rolling sphere
Abstract-- In an earlier paper [3], we addressed the problem of stabilization of the rolling sphere about any desired configuration. For the controller proposed in [3], we establis...
Tuhin Das, Ranjan Mukherjee
APCHI
2004
IEEE
13 years 8 months ago
NetWorker: A Practical Web-Based Tool to Support the Collect-Compare-Choose Cycle
An earlier paper has covered the development of a paper prototype of NetWorker, a tool designed to facilitate a Web usage referred to as the Collect-Compare-Choose cycle. Here we d...
Paul J. Lyons, Chris Phillips, Elizabeth A. Kemp, ...
SIGCOMM
1994
ACM
13 years 8 months ago
Experiences of Building an ATM Switch for the Local Area
The Fairisle project was concerned with ATM in the local area. An earlier paper 9] described the preliminary work and plans for the project. Here we present the experiences we hav...
Richard Black, Ian M. Leslie, Derek McAuley
SPC
2005
Springer
13 years 10 months ago
Exploiting Empirical Engagement in Authentication Protocol Design
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...