Sciweavers

1833 search results - page 273 / 367
» Mechanized Verification with Sharing
Sort
View
127
Voted
ICNP
2007
IEEE
15 years 11 months ago
Cooperation Between Stations in Wireless Networks
Abstract— In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, part...
Andrea G. Forte, Henning Schulzrinne
ICPADS
2007
IEEE
15 years 11 months ago
A semantic overlay network for unstructured peer-to-peer protocols
Peer-to-Peer computing has become a popular networking paradigm for file sharing, distributed computing, collaborative working, etc. The widely used unstructured Peer-to-Peer pro...
Junfeng Xie, Zhenhua Li, Guihai Chen
139
Voted
ICRA
2007
IEEE
150views Robotics» more  ICRA 2007»
15 years 11 months ago
Enhancing Software Modularity and Extensibility: A Case for using Generic Data Representations
— Portable, modular and extensible software allows robotics researchers to pool their resources by sharing algorithms, thus advancing research in the field of robotics at a fast...
Gregory Broten
INFOCOM
2007
IEEE
15 years 11 months ago
Multimodal Congestion Control for Low Stable-State Queuing
— To discover an efficient fair sending rate for a flow, Transmission Control Protocol (TCP) saturates the bottleneck link and its buffer until the router discards a packet. Su...
Maxim Podlesny, Sergey Gorinsky
KBSE
2007
IEEE
15 years 11 months ago
A dynamic birthmark for java
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...