Sciweavers

671 search results - page 128 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
IJAIT
2002
92views more  IJAIT 2002»
13 years 8 months ago
Extensible Information Brokers
The number and size of information services available on the internet has been growing exponentially over the past few years. This growth has created an urgent need for information...
Jianguo Lu, John Mylopoulos
ICCAD
2002
IEEE
142views Hardware» more  ICCAD 2002»
14 years 5 months ago
SAT and ATPG: Boolean engines for formal hardware verification
In this survey, we outline basic SAT- and ATPGprocedures as well as their applications in formal hardware verification. We attempt to give the reader a trace trough literature and...
Armin Biere, Wolfgang Kunz
TIP
2008
287views more  TIP 2008»
13 years 8 months ago
3-D Object Recognition Using 2-D Views
We consider the problem of recognizing 3-D objects from 2-D images using geometric models and assuming different viewing angles and positions. Our goal is to recognize and localize...
Wenjing Li, George Bebis, Nikolaos G. Bourbakis
MOBIHOC
2004
ACM
14 years 1 months ago
Market sharing games applied to content distribution in ad-hoc networks
In third generation (3G) wireless data networks, repeated requests for popular data items can exacerbate the already scarce wireless spectrum. In this paper we propose an architec...
Michel X. Goemans, Erran L. Li, Vahab S. Mirrokni,...
TON
2010
221views more  TON 2010»
13 years 3 months ago
Minimum-Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network
Abstract--In communication networks, multiple disjoint communication paths are desirable for many applications. Such paths, however, may not exist in a network. In such a situation...
S. Q. Zheng, Jianping Wang, Bing Yang, Mei Yang