Sciweavers

5255 search results - page 917 / 1051
» Formal Methods for Privacy
Sort
View
SIGCOMM
2006
ACM
15 years 9 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
WIKIS
2006
ACM
15 years 9 months ago
OntoWiki: community-driven ontology engineering and ontology usage based on Wikis
Ontologies are consensual representations of a domain of discourse and the backbone of the future Semantic Web. Currently, however, only a fraction of Web users can take part in t...
Martin Hepp, Daniel Bachlechner, Katharina Siorpae...
WIKIS
2006
ACM
15 years 9 months ago
Towards Wikis as semantic hypermedia
Similarly to the Web Wikis have advanced from initially simple ad-hoc solutions to highly popular systems of widespread use. This evolution is reflected by the impressive number ...
Robert Tolksdorf, Elena Paslaru Bontas Simperl
ASYNC
2005
IEEE
118views Hardware» more  ASYNC 2005»
15 years 9 months ago
Modeling and Verifying Circuits Using Generalized Relative Timing
We propose a novel technique for modeling and verifying timed circuits based on the notion of generalized relative timing. Generalized relative timing constraints can express not ...
Sanjit A. Seshia, Randal E. Bryant, Kenneth S. Ste...
CSB
2005
IEEE
141views Bioinformatics» more  CSB 2005»
15 years 9 months ago
Reconstructing Phylogenetic Networks Using Maximum Parsimony
Phylogenies—the evolutionary histories of groups of organisms—are one of the most widely used tools throughout the life sciences, as well as objects of research within systema...
Luay Nakhleh, Guohua Jin, Fengmei Zhao, John M. Me...