Sciweavers

4865 search results - page 723 / 973
» The Complexity of Graph Connectivity
Sort
View
JETAI
2006
63views more  JETAI 2006»
15 years 4 months ago
Principled exploitation of behavioural coupling
In robot building, attention tends to focus on internal signal processing and the way desired motor signals are generated. But equally important is the selection and configuration...
Chris Thornton
141
Voted
PERVASIVE
2008
Springer
15 years 4 months ago
Context-aware routing in wireless mesh networks
Wireless mesh networks promise to deliver resilient connectivity among network nodes, allowing data to be relayed seamlessly between mobile clients and infrastructure. Routing is ...
Peizhao Hu, Marius Portmann, Ricky Robinson, Jadwi...
TIT
2008
147views more  TIT 2008»
15 years 4 months ago
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special cla...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
CCR
2004
151views more  CCR 2004»
15 years 4 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
CORR
2004
Springer
146views Education» more  CORR 2004»
15 years 4 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham