Sciweavers

1485 search results - page 55 / 297
» connection 2010
Sort
View
123
Voted
AINA
2010
IEEE
14 years 11 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...
117
Voted
GMP
2010
IEEE
190views Solid Modeling» more  GMP 2010»
15 years 5 months ago
A Subdivision Approach to Planar Semi-algebraic Sets
Abstract. Semi-algebraic sets occur naturally when dealing with implicit models and boolean operations between them. In this work we present an algorithm to efficiently and in a ce...
Angelos Mantzaflaris, Bernard Mourrain
109
Voted
STOC
2010
ACM
211views Algorithms» more  STOC 2010»
15 years 5 months ago
Distributed Computation in Dynamic Networks
In this paper we investigate distributed computation in dynamic networks in which the network topology changes from round to round. We consider a worst-case model in which the com...
Fabian Kuhn, Nancy Lynch and Rotem Oshman
ADHOC
2010
126views more  ADHOC 2010»
15 years 27 days ago
Stable energy-aware topology management in ad hoc networks
Abstract-- The efficiency of a communication network depends not only on its control protocols, but also on the underlying network topology. We propose a distributed topology manag...
Lichun Bao, J. J. Garcia-Luna-Aceves
89
Voted
CII
2010
87views more  CII 2010»
15 years 26 days ago
The Unified Enterprise Modelling Language - Overview and further work
: The Unified Enterprise Modelling Language (UEML) aims to support integrated use of enterprise and IS models expressed in a variety of languages. The achieve this aim, UEML provid...
Víctor Anaya, Giuseppe Berio, Mounira Harza...