Sciweavers

722 search results - page 105 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
CORR
2010
Springer
64views Education» more  CORR 2010»
14 years 9 months ago
Dual Formulations of Mixed Finite Element Methods
Mixed finite element methods solve a PDE using two or more variables. The theory of Discrete Exterior Calculus explains why the degrees of freedom associated to the different varia...
Andrew Gillette, Chandrajit L. Bajaj
4OR
2010
107views more  4OR 2010»
14 years 11 months ago
On matrices with the Edmonds-Johnson property
s (from Seminario Dottorato's web page) 3 Notes of the seminars 9 Nicola Mazzari, A note on Grothendieck fundamental group . . . . . . . . . . . . . . 9 Marco Formentin, Infor...
Alberto Del Pia
MOBIHOC
2006
ACM
15 years 11 months ago
Proportionally fair allocation of end-to-end bandwidth in STDMA wireless networks
We consider the problem of designing distributed mechanisms for joint congestion control and resource allocation in spatial-reuse TDMA wireless networks. The design problem is pos...
Pablo Soldati, Björn Johansson, Mikael Johans...
APLAS
2007
ACM
15 years 3 months ago
More Typed Assembly Languages for Confidentiality
We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgment...
Dachuan Yu
IWIA
2005
IEEE
15 years 5 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...