Sciweavers

11381 search results - page 14 / 2277
» Connectivity
Sort
View
IJSN
2006
65views more  IJSN 2006»
15 years 1 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
DM
2007
86views more  DM 2007»
15 years 1 months ago
Short cycle connectivity
Short cycle connectivity is a generalization of ordinary connectivity—two vertices have to be connected by a sequence of short cycles, in which two consecutive cycles have at le...
Vladimir Batagelj, Matjaz Zaversnik
CORR
2010
Springer
126views Education» more  CORR 2010»
14 years 10 months ago
From Pathwidth to Connected Pathwidth
It is proven that the connected pathwidth of any graph G is at most 2
Dariusz Dereniowski
101
Voted
MOBIDE
2009
ACM
15 years 6 months ago
Data-aware connectivity in mobile replicated systems
Optimistic replication is a fundamental technique for supporting concurrent work practices in mobile environments. However, due to sudden and frequent transitions to weakly connec...
João Pedro Barreto, João Garcia, Lu&...
PDPTA
1997
15 years 3 months ago
Hazard-Free Connection Release
Abstract Fault-tolerant communication in a distributed system requires reliable connection management and message delivery. Reliable connection management includes the guarantee of...
Jennifer E. Walter, Jennifer L. Welch