Sciweavers

13895 search results - page 2639 / 2779
» Exploration
Sort
View
COMCOM
2008
84views more  COMCOM 2008»
13 years 8 months ago
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Peer-to-peer (P2P) dissemination systems are vulnerable to attacks that may impede nodes from receiving data in which they are interested. The same properties that lead P2P system...
Maya Haridasan, Robbert van Renesse
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 8 months ago
On the bias of BFS
Abstract--Breadth First Search (BFS) and other graph traversal techniques are widely used for measuring large unknown graphs, such as online social networks. It has been empiricall...
Maciej Kurant, Athina Markopoulou, Patrick Thiran
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 8 months ago
Parameterizing by the Number of Numbers
The usefulness of parameterized algorithmics has often depended on what Niedermeier has called, "the art of problem parameterization." In this paper we introduce and expl...
Michael R. Fellows, Serge Gaspers, Frances A. Rosa...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 8 months ago
The Physical World as a Virtual Reality
This paper explores the idea that the universe is a virtual reality created by information processing, and relates this strange idea to the findings of modern physics about the ph...
Brian Whitworth
CORR
2010
Springer
204views Education» more  CORR 2010»
13 years 8 months ago
Optimization Framework and Graph-Based Approach for Relay-Assisted Bidirectional OFDMA Cellular Networks
This paper considers a relay-assisted bidirectional cellular network where the base station (BS) communicates with each mobile station (MS) using orthogonal frequencydivision multi...
Yuan Liu, Meixia Tao, Bin Li, Hui Shen
« Prev « First page 2639 / 2779 Last » Next »