Sciweavers

1559 search results - page 259 / 312
» Some Group Theory Problems
Sort
View
JSAC
2008
95views more  JSAC 2008»
14 years 9 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
JCO
2006
126views more  JCO 2006»
14 years 9 months ago
Minimum power assignment in wireless ad hoc networks with spanner property
Power assignment for wireless ad hoc networks is to assign a power for each wireless node such that the induced communication graph has some required properties. Recently research ...
Yu Wang 0003, Xiang-Yang Li
IJAR
2007
86views more  IJAR 2007»
14 years 9 months ago
Non-deterministic semantics for logics with a consistency operator
In order to handle inconsistent knowledge bases in a reasonable way, one needs a logic which allows nontrivial inconsistent theories. Logics of this sort are called paraconsistent...
Arnon Avron
SIGOPS
2008
141views more  SIGOPS 2008»
14 years 9 months ago
Using model checkers in an introductory course on operating systems
During the last three years, we have been experimenting with the use of the Uppaal model checker in an introductory course on operating systems for first-year Computer Science stu...
Roelof Hamberg, Frits W. Vaandrager
AES
2005
Springer
105views Cryptology» more  AES 2005»
14 years 9 months ago
TH-collocation for the biharmonic equation
This paper is intended as a contribution to enhance orthogonal collocation methods. In this, a novel collocation method--TH-collocation--is applied to the biharmonic equation and ...
Martín Díaz, Ismael Herrera