Sciweavers

186
Voted
COMPUTING
2016
67views more  COMPUTING 2016»
10 years 1 months ago
Balanced multi-perspective checking of process conformance
Felix Mannhardt, Massimiliano de Leoni, Hajo A. Re...
34
Voted
COMPUTABILITY
2016
61views more  COMPUTABILITY 2016»
10 years 1 months ago
Asymptotic density and the coarse computability bound
For r ∈ [0, 1] we say that a set A ⊆ ω is coarsely computable at density r if there is a computable set C such that {n : C(n) = A(n)} has lower density at least r. Let γ(A) =...
Denis R. Hirschfeldt, Carl G. Jockusch Jr., Timoth...
329
Voted
COMGEO
2016
ACM
10 years 1 months ago
Convex blocking and partial orders on the plane
Let C = {c1, . . . , cn} be a collection of disjoint closed bounded convex sets in the plane. Suppose that one of them, say c1, represents a valuable object we want to uncover, an...
José Miguel Díaz-Báñez...
67
Voted
COMCOM
2016
58views more  COMCOM 2016»
10 years 1 months ago
Cognitive radio based connectivity management for resilient end-to-end communications in VANETs
VANET has attracted a good deal of attention owing to its wide range of important applications. VANET is a special kind of mobile ad hoc network, in which most of the nodes are sp...
Cláudio Silva, Michele Nogueira, Donghyun K...
56
Voted
COMCOM
2016
44views more  COMCOM 2016»
10 years 1 months ago
The power of indirect ties
—Friend-to-Friend (F2F) storage systems were shown to suffer from two significant limitations. First, users with a small set of friends are penalized by lack of available storag...
Xiang Zuo, Jeremy Blackburn, Nicolas Kourtellis, J...