Sciweavers

13987 search results - page 104 / 2798
» The Two Guards Problem
Sort
View
TPDS
2008
98views more  TPDS 2008»
15 years 2 months ago
Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Systems: Modeling Analysis and Improvement
BitTorrent has emerged as a very popular peer-to-peer file sharing system, which uses an embedded set of incentive mechanisms to encourage contribution and prevent free-riding. How...
Minglu Li, Jiadi Yu, Jie Wu
AGP
2010
IEEE
15 years 1 months ago
Concurrent and Reactive Constraint Programming
The Italian Logic Programming community has given several contributions to the theory of Concurrent Constraint Programming. In particular, in the topics of semantics, verification,...
Maurizio Gabbrielli, Catuscia Palamidessi, Frank D...
MOBILWARE
2010
ACM
15 years 1 months ago
ISI and ICI Suppression for Mobile OFDM System by Using a Hybrid 2-Layer Diversity Receiver
An OFDM system is very sensitive to orthogonality relation. For a mobile wireless system, it is impossible to avoid Doppler-induced inter carrier interference (ICI). Moreover, whil...
Jing Gao, Tomohisa Wada
146
Voted
IEEEIAS
2009
IEEE
15 years 1 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
EAAI
2006
92views more  EAAI 2006»
15 years 3 months ago
Solving terminal assignment problems with groups encoding: The wedding banquet problem
This paper presents an extension of the terminal assignment problem (TA) in the case that groups of terminals must be assigned together. We analyze this situation by means of an e...
Sancho Salcedo-Sanz, José Antonio Portilla-...