Sciweavers

3086 search results - page 535 / 618
» Generalized Discriminant Analysis Using a Kernel Approach
Sort
View
STACS
2007
Springer
15 years 8 months ago
Broadcasting vs. Mixing and Information Dissemination on Cayley Graphs
One frequently studied problem in the context of information dissemination in communication networks is the broadcasting problem. In this paper, we study the following randomized b...
Robert Elsässer, Thomas Sauerwald
TACAS
2007
Springer
165views Algorithms» more  TACAS 2007»
15 years 8 months ago
Unfolding Concurrent Well-Structured Transition Systems
Abstract. Our main objective is to combine partial-order methods with verification techniques for infinite-state systems in order to obtain efficient verification algorithms fo...
Frédéric Herbreteau, Grégoire...
119
Voted
GLOBECOM
2006
IEEE
15 years 8 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
ACL2
2006
ACM
15 years 8 months ago
Implementing a cost-aware evaluator for ACL2 expressions
One of ACL2’s most interesting features is that it is executable, so users can run the programs that they verify, and debug them during verification. In fact, the ACL2 implemen...
Ruben Gamboa, John R. Cowles
MOBICOM
2006
ACM
15 years 8 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal