Sciweavers

9186 search results - page 1347 / 1838
» A Module System for Scheme
Sort
View
CN
2010
112views more  CN 2010»
15 years 2 months ago
An Internet without the Internet protocol
The growth of the Internet has brought about many challenges for its critical infrastructure. The DNS infrastructure, which translates mnemonic host names into IP addresses unders...
Craig A. Shue, Minaxi Gupta
172
Voted
DATE
2010
IEEE
197views Hardware» more  DATE 2010»
14 years 11 months ago
Compilation of stream programs for multicore processors that incorporate scratchpad memories
The stream processing characteristics of many embedded system applications in multimedia and networking domains have led to the advent of stream based programming formats. Several ...
Weijia Che, Amrit Panda, Karam S. Chatha
SIAMAM
2011
14 years 11 months ago
A General Phase Transition Model for Vehicular Traffic
An extension of the Colombo phase transition model is proposed. The congestion phase is described by a two-dimensional zone defined around an equilibrium flux known as the classi...
Sebastien Blandin, Daniel B. Work, Paola Goatin, B...
TIT
2011
125views more  TIT 2011»
14 years 11 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
WICOMM
2011
14 years 11 months ago
The effects of shadow-fading on QoS-aware routing and admission control protocols designed for multi-hop MANETs
—Providing quality-of-service (QoS) assurances in a mobile ad hoc network (MANET) is difficult due to node mobility, contention for channel access, a lack of centralised coordin...
Lajos Hanzo, Rahim Tafazolli
« Prev « First page 1347 / 1838 Last » Next »