Sciweavers

6607 search results - page 213 / 1322
» Making TeX Work
Sort
View
120
Voted
WDAG
2009
Springer
114views Algorithms» more  WDAG 2009»
15 years 10 months ago
Virtual Ring Routing Trends
Virtual Ring Routing (VRR) schemes were introduced in the context of wireless ad hoc networks and Internet anycast overlays. They build a network-routing layer using ideas from dis...
Dahlia Malkhi, Siddhartha Sen, Kunal Talwar, Renat...
150
Voted
MOBICOM
2009
ACM
15 years 10 months ago
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Shuo Guo, Yu Gu, Bo Jiang, Tian He
LICS
2006
IEEE
15 years 9 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
ISPD
2006
ACM
90views Hardware» more  ISPD 2006»
15 years 9 months ago
Fast buffer insertion considering process variations
Advanced process technologies call for a proactive consideration of process variations in design to ensure high parametric timing yield. Despite of its popular use in almost any h...
Jinjun Xiong, Lei He
IWCMC
2006
ACM
15 years 9 months ago
What does using TCP as an evaluation tool reveal about MANET routing protocols?
Past research studying the operations of TCP over wireless/mobile ad hoc networks has shown that TCP cannot be adopted as-is for use in mobile ad hoc networks (MANET) to achieve r...
Sundaram Rajagopalan, Chien-Chung Shen