Sciweavers

284 search results - page 38 / 57
» di 2006
Sort
View
JGAA
2008
97views more  JGAA 2008»
14 years 11 months ago
Drawing Bipartite Graphs on Two Parallel Convex Curves
Let G be a bipartite graph, and let e, i be two parallel convex curves; we study the question about whether G admits a planar straight-line drawing such that the vertices of one p...
Emilio Di Giacomo, Luca Grilli, Giuseppe Liotta
APPML
2007
75views more  APPML 2007»
14 years 12 months ago
Analysis of substructuring preconditioners for mortar methods in an abstract framework
framework Silvia Bertoluzza∗, Micol Pennacchio Istituto di Matematica Applicata e Tecnologie Informatiche del C.N.R., v. Ferrata 1, 27100 Pavia, Italy Received 16 February 2006; ...
Silvia Bertoluzza, Micol Pennacchio
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
15 years 5 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
JAIR
1998
195views more  JAIR 1998»
14 years 11 months ago
AntNet: Distributed Stigmergetic Control for Communications Networks
This paper introduces AntNet, a novel approach to the adaptive learning of routing tables in communications networks. AntNet is a distributed, mobile agents based Monte Carlo syst...
Gianni Di Caro, Marco Dorigo
INFSOF
2002
153views more  INFSOF 2002»
14 years 11 months ago
Analyzing cloning evolution in the Linux kernel
Identifying code duplication in large multi-platform software systems is a challenging problem. This is due to a variety of reasons including the presence of high-level programmin...
Giuliano Antoniol, Umberto Villano, Ettore Merlo, ...