Sciweavers

386 search results - page 19 / 78
» Fundamental Questions
Sort
View
INFOCOM
2008
IEEE
14 years 4 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
INFOCOM
2010
IEEE
13 years 8 months ago
Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P Systems
—Network positioning systems provide an important service to large-scale P2P systems, potentially enabling clients to achieve higher performance, reduce cross-ISP traffic and im...
David R. Choffnes, Mario Sanchez, Fabian E. Bustam...
BC
2002
72views more  BC 2002»
13 years 9 months ago
Spatiotemporal specificity of synaptic plasticity: cellular rules and mechanisms
Abstract. Recent experimental results on spike-timingdependent plasticity (STDP) and heterosynaptic interaction in various systems have revealed new temporal and spatial properties...
Guo-Qiang Bi
TACAS
2010
Springer
160views Algorithms» more  TACAS 2010»
14 years 4 months ago
Optimal Tableau Algorithms for Coalgebraic Logics
Deciding whether a modal formula is satisfiable with respect to a given set of (global) assumptions is a question of fundamental importance in applications of logic in computer sc...
Rajeev Goré, Clemens Kupke, Dirk Pattinson
SUTC
2006
IEEE
14 years 3 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo