Sciweavers

11381 search results - page 14 / 2277
» Connectivity
Sort
View
IJSN
2006
65views more  IJSN 2006»
14 years 9 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
DM
2007
86views more  DM 2007»
14 years 9 months ago
Short cycle connectivity
Short cycle connectivity is a generalization of ordinary connectivity—two vertices have to be connected by a sequence of short cycles, in which two consecutive cycles have at le...
Vladimir Batagelj, Matjaz Zaversnik
CORR
2010
Springer
126views Education» more  CORR 2010»
14 years 6 months ago
From Pathwidth to Connected Pathwidth
It is proven that the connected pathwidth of any graph G is at most 2
Dariusz Dereniowski
MOBIDE
2009
ACM
15 years 2 months ago
Data-aware connectivity in mobile replicated systems
Optimistic replication is a fundamental technique for supporting concurrent work practices in mobile environments. However, due to sudden and frequent transitions to weakly connec...
João Pedro Barreto, João Garcia, Lu&...
PDPTA
1997
14 years 11 months ago
Hazard-Free Connection Release
Abstract Fault-tolerant communication in a distributed system requires reliable connection management and message delivery. Reliable connection management includes the guarantee of...
Jennifer E. Walter, Jennifer L. Welch