Sciweavers

819 search results - page 144 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
AMW
2010
14 years 11 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
76
Voted
ESWA
2006
149views more  ESWA 2006»
14 years 10 months ago
An effective refinement strategy for KNN text classifier
Due to the exponential growth of documents on the Internet and the emergent need to organize them, the automated categorization of documents into predefined labels has received an...
Songbo Tan
129
Voted
ASMTA
2010
Springer
192views Mathematics» more  ASMTA 2010»
14 years 8 months ago
Packet Loss Minimization in Load-Balancing Switch
Due to the overall growing demand on the network resources and tight restrictions on the power consumption, the requirements to the long-term scalability, cost and performance capa...
Yury Audzevich, Levente Bodrog, Yoram Ofek, Mikl&o...
RTAS
2011
IEEE
14 years 1 months ago
Deterministic and Stochastic QoS Provision for Real-Time Control Systems
—In this paper, we propose two adaptive scheduling approaches to support real-time control applications with highly varying computation times. The use of a resource reservation s...
Daniele Fontanelli, Luigi Palopoli, Luca Greco
MOBIHOC
2002
ACM
15 years 9 months ago
On the minimum node degree and connectivity of a wireless multihop network
This paper investigates two fundamental characteristics of a wireless multihop network: its minimum node degree and its k?connectivity. Both topology attributes depend on the spat...
Christian Bettstetter