Sciweavers

1972 search results - page 114 / 395
» connection 2008
Sort
View
IJIPT
2008
64views more  IJIPT 2008»
15 years 25 days ago
Inline bandwidth measurement techniques for gigabit networks
: We introduce an inline measurement method that can overcome difficulties in measurement task in high-speed network environment, such as short packet transmission intervals and In...
Cao Le Thanh Man, Go Hasegawa, Masayuki Murata
JGT
2008
150views more  JGT 2008»
15 years 24 days ago
Cycle spaces in topological spaces
: We develop a general model of edge spaces in order to generalize, unify, and simplify previous work on cycle spaces of infinite graphs. We give simple topological criteria to sho...
Antoine Vella, R. Bruce Richter
90
Voted
JGT
2008
107views more  JGT 2008»
15 years 24 days ago
On planar intersection graphs with forbidden subgraphs
Let C be a family of n compact connected sets in the plane, whose intersection graph G(C) has no complete bipartite subgraph with k vertices in each of its classes. Then G(C) has ...
János Pach, Micha Sharir
86
Voted
DCG
2007
86views more  DCG 2007»
15 years 23 days ago
Ball-Polyhedra
We study two notions. One is that of spindle convexity. A set of circumradius not greater than one is spindle convex if, for any pair of its points, it contains every short circula...
Károly Bezdek, Zsolt Langi, Márton N...
JSW
2008
118views more  JSW 2008»
15 years 23 days ago
Deciding the Correctness of Attacks on Authentication Protocols
A new tool for automated validation of attacks on authentication protocols has been used to find several errors and ambiguities in the list of attacks described in the well known r...
Anders Moen Hagalisletto