Sciweavers

16843 search results - page 3294 / 3369
» On Generalized Authorization Problems
Sort
View
89
Voted
CCR
2010
139views more  CCR 2010»
15 years 24 days ago
Longitudinal study of BGP monitor session failures
BGP routing data collected by RouteViews and RIPE RIS have become an essential asset to both the network research and operation communities. However, it has long been speculated t...
Pei-chun Cheng, Xin Zhao, Beichuan Zhang, Lixia Zh...
96
Voted
CCR
2010
105views more  CCR 2010»
15 years 24 days ago
Fostering IPv6 migration through network quality differentials
This paper develops a simple model that explores the extent to which differences in connectivity quality can be effective incentives (or disincentives) towards migrating to an IPv...
Roch Guérin, Kartik Hosanagar
115
Voted
CGF
2008
201views more  CGF 2008»
15 years 24 days ago
High-Resolution Volumetric Computation of Offset Surfaces with Feature Preservation
We present a new algorithm for the efficient and reliable generation of offset surfaces for polygonal meshes. The algorithm is robust with respect to degenerate configurations and...
Darko Pavic, Leif Kobbelt
CN
2008
106views more  CN 2008»
15 years 24 days ago
Efficient virtual-backbone routing in mobile ad hoc networks
Since the physical topology of Mobile Ad hoc Networks (MANETs) is generally unstable, an appealing approach is the construction of a stable and robust virtual topology or backbone...
Jamal N. Al-Karaki, Ahmed E. Kamal
CORR
2010
Springer
208views Education» more  CORR 2010»
15 years 24 days ago
Bounded Model Checking of Multi-threaded Software using SMT solvers
The transition from single-core to multi-core processors has made multi-threaded software an important subject in computer aided verification. Here, we describe and evaluate an ex...
Lucas Cordeiro, Bernd Fischer 0002
« Prev « First page 3294 / 3369 Last » Next »