Sciweavers

4502 search results - page 752 / 901
» Regular Model Checking
Sort
View
INFOCOM
2007
IEEE
15 years 11 months ago
When TCP Friendliness Becomes Harmful
Abstract— Short TCP flows may suffer significant responsetime performance degradations during network congestion. Unfortunately, this creates an incentive for misbehavior by cl...
Amit Mondal, Aleksandar Kuzmanovic
ITNG
2007
IEEE
15 years 11 months ago
Software Reuse: Research and Practice
— It has been almost four decades since the idea of software reuse was proposed. Many success stories have been told, yet it is believed that software reuse is still in the devel...
Sajjan G. Shiva, Lubna Abou Shala
MOBIQUITOUS
2007
IEEE
15 years 11 months ago
Content Source Selection in Bluetooth Networks
—Large scale market penetration of electronic devices equipped with Bluetooth technology now gives the ability to share content (such as music or video clips) between members of ...
Liam McNamara, Cecilia Mascolo, Licia Capra
ROMAN
2007
IEEE
156views Robotics» more  ROMAN 2007»
15 years 11 months ago
Development and User Testing of the Gestural Joystick for Gloves-On Hazardous Environments
— For controlling robots in an urban search and rescue (USAR) application, we present a wearable joystick with improved sensing capability as well as Giant MagnetoResistance(GMR)...
Jaewook Bae, Amy C. Larson, Richard M. Voyles, Roy...
ASIACRYPT
2007
Springer
15 years 11 months ago
How to Build a Hash Function from Any Collision-Resistant Function
Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision ...
Thomas Ristenpart, Thomas Shrimpton