Sciweavers

1757 search results - page 155 / 352
» Secure Content Validation
Sort
View
IJIPT
2006
58views more  IJIPT 2006»
14 years 11 months ago
On protocol engineering: detect, confirm and adjust
: In this paper, we depart from TCP-Probing (Tsaoussidis and Badr, 2000) and propose an experimental transport protocol that achieves energy and throughput performance gains in mix...
Ioannis Psaras, Lefteris Mamatas, Vassilis Tsaouss...
IJLT
2006
89views more  IJLT 2006»
14 years 11 months ago
How do you know they are learning? The importance of alignment in higher education
: The success of any learning environment is determined by the degree to which there is adequate alignment among eight critical factors: 1) goals, 2) content, 3) instructional desi...
Thomas C. Reeves
ICASSP
2010
IEEE
14 years 10 months ago
Exploring statistical properties for semantic annotation: sparse distributed and convergent assumptions for keywords
Does there exist a compact set of visual topics in form of keyword clusters capable to represent all images visual content within an acceptable error? In this paper, we answer thi...
Xianming Liu, Hongxun Yao, Rongrong Ji
SPIN
2010
Springer
14 years 10 months ago
An Automata-Based Symbolic Approach for Verifying Programs on Relaxed Memory Models
This paper addresses the problem of verifying programs for the relaxed memory models implemented in modern processors. Specifically, it considers the TSO (Total Store Order) relax...
Alexander Linden, Pierre Wolper
JSAC
2011
137views more  JSAC 2011»
14 years 2 months ago
A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
Yen-Cheng Lai, Phone Lin, Wanjiun Liao, Chung-Min ...