Sciweavers

675 search results - page 28 / 135
» Using Fairness to Make Abstractions Work
Sort
View
121
Voted
ICC
2000
IEEE
111views Communications» more  ICC 2000»
15 years 6 months ago
Improving Bandwidth Utilization Based on Deterministic Delay Bound in Connection-Oriented Networks
Abstract—Packet scheduling disciplines play an important role in providing Quality of Service (QoS) guarantees to applications traffic in high speed networks. Several scheduling...
Peerapon Siripongwutikorn, Sujata Banerjee
126
Voted
ENTCS
2008
170views more  ENTCS 2008»
15 years 1 months ago
A Coq Library for Verification of Concurrent Programs
Thanks to recent advances, modern proof assistants now enable verification of realistic sequential programs. However, regarding the concurrency paradigm, previous work essentially...
Reynald Affeldt, Naoki Kobayashi
TWC
2008
176views more  TWC 2008»
15 years 1 months ago
Asynchronous distributed power and rate control in ad hoc networks: a game-theoretic approach
This paper analyzes distributed asynchronous power and rate control for wireless ad hoc networks. Importantly, all network transmitters are considered to be independent of any mana...
Stepán Kucera, Sonia Aïssa, Koji Yamam...
CICLING
2005
Springer
15 years 7 months ago
Incremental Information Extraction Using Tree-Based Context Representations
Abstract. The purpose of information extraction (IE) is to find desired pieces of information in natural language texts and store them in a form that is suitable for automatic pro...
Christian Siefkes
IACR
2011
207views more  IACR 2011»
14 years 1 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li