Sciweavers

2419 search results - page 213 / 484
» A Simple DOCSIS Simulator
Sort
View
LOPSTR
2001
Springer
15 years 4 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
WABI
2001
Springer
112views Bioinformatics» more  WABI 2001»
15 years 4 months ago
Finding an Optimal Inversion Median: Experimental Results
We derive a branch-and-bound algorithm to find an optimal inversion median of three signed permutations. The algorithm prunes to manageable size an extremely large search tree usi...
Adam C. Siepel, Bernard M. E. Moret
ICC
2000
IEEE
109views Communications» more  ICC 2000»
15 years 4 months ago
OFDM with Trailing Zeros versus OFDM with Cyclic Prefix: Links, Comparisons, and Application to the HiperLAN/2 System
This paper proposes a simple equalizer for a recent multicarrier block transmission scheme which pads zeros (as opposed to a cyclic prefix) in each transmitted block. In the abse...
Bertrand Muquet, Marc de Courville, Pierre Duhamel...
ICC
2000
IEEE
144views Communications» more  ICC 2000»
15 years 4 months ago
Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks
– This paper presents a novel routing protocol for wireless ad hoc networks – Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce rou...
Guangyu Pei, Mario Gerla, Tsu-Wei Chen
ICDCSW
2000
IEEE
15 years 4 months ago
Fisheye State Routing in Mobile Ad Hoc Networks
In this paper, we present a novel routing protocol for wireless ad hoc networks – Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce ...
Guangyu Pei, Mario Gerla, Tsu-Wei Chen