Sciweavers

2421 search results - page 362 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
SENSYS
2003
ACM
15 years 9 months ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
IMC
2010
ACM
15 years 2 months ago
Eyeball ASes: from geography to connectivity
This paper presents a new approach to determine the geographical footprint of individual Autonomous Systems that directly provide service to end-users, i.e.,eyeball ASes. The key ...
Amir H. Rasti, Nazanin Magharei, Reza Rejaie, Walt...
WETICE
2005
IEEE
15 years 10 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop
CLUSTER
2006
IEEE
15 years 8 months ago
A Performance Instrumentation Framework to Characterize Computation-Communication Overlap in Message-Passing Systems
Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end compu...
Aniruddha G. Shet, P. Sadayappan, David E. Bernhol...
LREC
2008
154views Education» more  LREC 2008»
15 years 5 months ago
A Comparative Evaluation of Term Recognition Algorithms
Automatic Term recognition (ATR) is a fundamental processing step preceding more complex tasks such as semantic search and ontology learning. From a large number of methodologies ...
Ziqi Zhang, José Iria, Christopher Brewster...