Sciweavers

1462 search results - page 188 / 293
» The Abstract MAC Layer
Sort
View
ECOOP
2008
Springer
15 years 2 months ago
Computing Stack Maps with Interfaces
Abstract. Lightweight bytecode verification uses stack maps to annotate Java bytecode programs with type information in order to reduce the verification to type checking. This pape...
Frédéric Besson, Thomas P. Jensen, T...
98
Voted
ADHOC
2010
97views more  ADHOC 2010»
15 years 28 days ago
Modeling and analysis of two-flow interactions in wireless networks
Abstract--Interference plays a complex and often defining role in the performance of wireless networks, especially in multi-hop scenarios. In the presence of interference, Carrier ...
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh
105
Voted
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 27 days ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 27 days ago
Computational efficiency of fractional diffusion using adaptive time step memory
Abstract: Numerical solutions to fractional differential equations can be extremely computationally intensive due to the effect of non-local derivatives in which all previous time ...
Brian P. Sprouse, Christopher L. MacDonald, Gabrie...
110
Voted
CORR
2006
Springer
176views Education» more  CORR 2006»
15 years 25 days ago
On the Fingerprinting Capacity Under the Marking Assumption
Abstract--We address the maximum attainable rate of fingerprinting codes under the marking assumption, studying lower and upper bounds on the value of the rate for various sizes of...
N. Prasanth Anthapadmanabhan, Alexander Barg, Ilya...