Sciweavers

3602 search results - page 622 / 721
» Isn't It About Time
Sort
View
MUE
2008
IEEE
103views Multimedia» more  MUE 2008»
14 years 3 months ago
Ubiquitous Web Access: Collaborative Optimization and Dynamic Content Negotiation
Traditionally, cellular wide area networks like UMTS are used as Internet access networks for particular users but, in some cases, they can be employed to provide Internet access ...
Xavier Sanchez-Loro, Victoria Beltran, Jordi Casad...
NCA
2008
IEEE
14 years 3 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
QEST
2008
IEEE
14 years 3 months ago
Quasi-Birth-Death Processes, Tree-Like QBDs, Probabilistic 1-Counter Automata, and Pushdown Systems
We begin by observing that (discrete-time) QuasiBirth-Death Processes (QBDs) are equivalent, in a precise sense, to (discrete-time) probabilistic 1-Counter Automata (p1CAs), and b...
Kousha Etessami, Dominik Wojtczak, Mihalis Yannaka...
SCAM
2008
IEEE
14 years 3 months ago
Modular Decompilation of Low-Level Code by Partial Evaluation
Decompiling low-level code to a high-level intermediate representation facilitates the development of analyzers, model checkers, etc. which reason about properties of the low-leve...
Miguel Gómez-Zamalloa, Elvira Albert, Germ&...
WIMOB
2008
IEEE
14 years 3 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao