Sciweavers

628 search results - page 60 / 126
» Magic Counting Methods
Sort
View
ICC
2008
IEEE
141views Communications» more  ICC 2008»
14 years 2 months ago
Greedy Hop Distance Routing Using Tree Recovery on Wireless Ad Hoc and Sensor Networks
—Connectivity-based routing protocols use the hop count vector to a group of anchors for packet forwarding. Due to the discrete nature of hop count based coordinates, without an ...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan
COMPSAC
2007
IEEE
14 years 2 months ago
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
Xia Wang, Johnny Wong
ISSAC
2007
Springer
107views Mathematics» more  ISSAC 2007»
14 years 2 months ago
A disk-based parallel implementation for direct condensation of large permutation modules
Through the use of a new disk-based method for enumerating very large orbits, condensation for orbits with tens of billions of elements can be performed. The algorithm is novel in...
Eric Robinson, Jürgen Müller 0004, Gene ...
RTCSA
2005
IEEE
14 years 1 months ago
Integrating Hybrid Garbage Collection with Dual Priority Scheduling
In this report, we propose an approach to integrate a hybrid garbage collection algorithm into the current response time analysis framework for real-time systems. In our approach,...
Yang Chang, Andy J. Wellings
LREC
2010
155views Education» more  LREC 2010»
13 years 9 months ago
Efficient Minimal Perfect Hash Language Models
The recent availability of large collections of text such as the Google 1T 5-gram corpus (Brants and Franz, 2006) and the Gigaword corpus of newswire (Graff, 2003) have made it po...
David Guthrie, Mark Hepple, Wei Liu