Sciweavers

24741 search results - page 4765 / 4949
» Virtual Network Computing
Sort
View
109
Voted
INFORMS
2010
147views more  INFORMS 2010»
14 years 10 months ago
Exact Algorithms for the Quadratic Linear Ordering Problem
The quadratic linear ordering problem naturally generalizes various optimization problems, such as bipartite crossing minimization or the betweenness problem, which includes linear...
Christoph Buchheim, Angelika Wiegele, Lanbo Zheng
129
Voted
ISCI
2010
146views more  ISCI 2010»
14 years 10 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
136
Voted
CCR
2011
14 years 7 months ago
Application flow control in YouTube video streams
This paper presents the results of an investigation into the application flow control technique utilised by YouTube. We reveal and describe the basic properties of YouTube applic...
Shane Alcock, Richard Nelson
108
Voted
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
14 years 7 months ago
Formal analysis of piecewise affine systems through formula-guided refinement
Abstract-- We present a computational framework for identifying a set of initial states from which all trajectories of a piecewise affine (PWA) system satisfy a Linear Temporal Log...
Boyan Yordanov, Jana Tumova, Calin Belta, Ivana Ce...
ISCI
2011
14 years 7 months ago
Augmented k-ary n-cubes
We define an interconnection network AQn,k which we call the augmented kary n-cube by extending a k-ary n-cube in a manner analogous to the existing extension of an n-dimensional...
Yonghong Xiang, Iain A. Stewart
« Prev « First page 4765 / 4949 Last » Next »