Sciweavers

1204 search results - page 142 / 241
» Termination of Polynomial Programs
Sort
View
82
Voted
IWANN
2009
Springer
15 years 7 months ago
Outdoors Monitoring of Elderly People Assisted by Compass, GPS and Mobile Social Network
Abstract. We explore the use of mobile social network technology combined with modern mobile phone hardware as a platform for programming applications in the elder care area. An ap...
Roberto Calvo-Palomino, Pedro de las Heras Quir&oa...
IFIP
2007
Springer
15 years 6 months ago
Multicast in UMTS: Adopting TCP-Friendliness
In this paper, we present a novel mechanism for the multicast congestion control over UMTS networks. The proposed mechanism is based on the well known TCP-Friendly Multicast Conges...
Antonios G. Alexiou, Christos Bouras, Andreas Papa...
93
Voted
ITNG
2006
IEEE
15 years 6 months ago
Secure Two-Way Transfer of Measurement Data
We introduce a measurement system architecture, which has three main qualities: secure two-way transfer of measurement data, quick adaptability to different kinds of measurement ...
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesm...
DSVIS
2005
Springer
15 years 6 months ago
A Calculus for the Refinement and Evolution of Multi-user Mobile Applications
The calculus outlined in this paper provides a formal architectural framework for describing and reasoning about the properties of multi-user and mobile distributed interactive sys...
W. Greg Phillips, T. C. Nicholas Graham, Christoph...
SAS
2005
Springer
15 years 6 months ago
Secure Information Flow as a Safety Problem
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D’Argenio, and Rezk coined th...
Tachio Terauchi, Alexander Aiken