Sciweavers

1485 search results - page 55 / 297
» connection 2010
Sort
View
165
Voted
AINA
2010
IEEE
15 years 4 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...
156
Voted
GMP
2010
IEEE
190views Solid Modeling» more  GMP 2010»
15 years 10 months ago
A Subdivision Approach to Planar Semi-algebraic Sets
Abstract. Semi-algebraic sets occur naturally when dealing with implicit models and boolean operations between them. In this work we present an algorithm to efficiently and in a ce...
Angelos Mantzaflaris, Bernard Mourrain
160
Voted
STOC
2010
ACM
211views Algorithms» more  STOC 2010»
15 years 10 months ago
Distributed Computation in Dynamic Networks
In this paper we investigate distributed computation in dynamic networks in which the network topology changes from round to round. We consider a worst-case model in which the com...
Fabian Kuhn, Nancy Lynch and Rotem Oshman
ADHOC
2010
126views more  ADHOC 2010»
15 years 5 months ago
Stable energy-aware topology management in ad hoc networks
Abstract-- The efficiency of a communication network depends not only on its control protocols, but also on the underlying network topology. We propose a distributed topology manag...
Lichun Bao, J. J. Garcia-Luna-Aceves
CII
2010
87views more  CII 2010»
15 years 5 months ago
The Unified Enterprise Modelling Language - Overview and further work
: The Unified Enterprise Modelling Language (UEML) aims to support integrated use of enterprise and IS models expressed in a variety of languages. The achieve this aim, UEML provid...
Víctor Anaya, Giuseppe Berio, Mounira Harza...