Sciweavers

592 search results - page 98 / 119
» Can Component Service-Based Systems Be Proved Correct
Sort
View
DIALM
2010
ACM
146views Algorithms» more  DIALM 2010»
13 years 9 months ago
Regional consecutive leader election in mobile ad-hoc networks
In this paper we introduce the regional consecutive leader election (RCLE) problem, which extends the classic leader election problem to the ever-changing environment of mobile ad-...
Hyun Chul Chung, Peter Robinson, Jennifer L. Welch
CONEXT
2009
ACM
13 years 9 months ago
A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement
The accuracy and speed of path capacity measurement could be seriously affected by the presence of cross traffic on the path. In this paper, we propose a new cross-traffic filteri...
Edmond W. W. Chan, Xiapu Luo, Rocky K. C. Chang
CN
2008
108views more  CN 2008»
13 years 8 months ago
Finding a dense-core in Jellyfish graphs
The connectivity of the Internet crucially depends on the relationships between thousands of Autonomous Systems (ASes) that exchange routing information using the Border Gateway P...
Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool
TROB
2002
117views more  TROB 2002»
13 years 8 months ago
Concurrent metamorphosis of hexagonal robot chains into simple connected configurations
Abstract-- The problem addressed is the distributed reconfiguration of a metamorphic robotic system composed of an arbitrary number of two dimensional hexagonal robots (modules) fr...
Jennifer E. Walter, Jennifer L. Welch, Nancy M. Am...
JSC
2010
106views more  JSC 2010»
13 years 7 months ago
Verifying pointer safety for programs with unknown calls
We study the automated verification of pointer safety for heap-manipulating imperative programs with unknown procedure calls. Given a Hoare-style partial correctness specificati...
Chenguang Luo, Florin Craciun, Shengchao Qin, Guan...