Sciweavers

4744 search results - page 414 / 949
» Connected Computing
Sort
View
CSE
2009
IEEE
15 years 9 months ago
A Unified Approach to Intra-domain Security
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to sec...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
RTA
2010
Springer
15 years 9 months ago
A Proof Calculus Which Reduces Syntactic Bureaucracy
In usual proof systems, like the sequent calculus, only a very limited way of combining proofs is available through the tree structure. We present in this paper a logicindependent ...
Alessio Guglielmi, Tom Gundersen, Michel Parigot
WCNC
2010
IEEE
15 years 9 months ago
Planning of Relay Station Locations in IEEE 802.16 (WiMAX) Networks
— Broadband wireless access networks have received tremendous attention in terms of research and development in the recent years. There have also been test networks deployed in m...
Zakhia G. Abichar, Ahmed E. Kamal, J. Morris Chang
118
Voted
GRAPHITE
2007
ACM
15 years 9 months ago
Squidsoup
: Communicating the ethos of a subject (e.g. a brand or cultural or historical narrative) within an environment, such as a museum or visitor centre, is often undermined by the poor...
Anthony Rowe
147
Voted
BROADNETS
2004
IEEE
15 years 8 months ago
A Scalable Algorithm for Survivable Routing in IP-Over-WDM Networks
In IP-over-WDM networks, a logical IP network has to be routed on top of a physical optical fiber network. An important challenge hereby is to make the routing survivable. We call...
Frederick Ducatelle, Luca Maria Gambardella