Sciweavers

1852 search results - page 115 / 371
» From Bi-ideals to Periodicity
Sort
View
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
14 years 2 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
TCS
2008
13 years 10 months ago
Setting port numbers for fast graph exploration
We consider the problem of periodic graph exploration by a finite automaton in which an automaton with a constant number of states has to explore all unknown anonymous graphs of a...
David Ilcinkas
SIGCOMM
1996
ACM
14 years 3 months ago
Improving the Start-Up Behavior of a Congestion Control Scheme for TCP
Based on experiments conducted in a network simulator and over real networks, this paper proposes changes to the congestion control scheme in current TCP implementations to improv...
Janey C. Hoe
WSC
2007
14 years 1 months ago
Agent-model validation based on historical data
Combat, unlike many real-world processes, tends to be singular in nature. That is, there are not multiple occurrences from which to hypothesize a probability distribution model of...
Lance E. Champagne, Raymond R. Hill
ICCV
2003
IEEE
15 years 26 days ago
Real-Time Simultaneous Localisation and Mapping with a Single Camera
Ego-motion estimation for an agile single camera moving through general, unknown scenes becomes a much more challenging problem when real-time performance is required rather than ...
Andrew J. Davison