Sciweavers

2478 search results - page 79 / 496
» Message from the Chair
Sort
View
156
Voted
MOBICOM
2004
ACM
15 years 9 months ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the eï...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...
STOC
2004
ACM
138views Algorithms» more  STOC 2004»
15 years 9 months ago
Know thy neighbor's neighbor: the power of lookahead in randomized P2P networks
Several peer-to-peer networks are based upon randomized graph topologies that permit efficient greedy routing, e.g., randomized hypercubes, randomized Chord, skip-graphs and const...
Gurmeet Singh Manku, Moni Naor, Udi Wieder
WSE
2003
IEEE
15 years 9 months ago
Evaluation Methods for Web Application Clustering
ing Business UML Diagrams from Web Applications G. Di Lucca, University of Sannio, Italy; A. Fasolino, P. Tramontana, U. De Carlini, University of Naples, Italy (25 min) Developmen...
Paolo Tonella, Filippo Ricca, Emanuele Pianta, Chr...
ASM
2003
ASM
15 years 9 months ago
A Framework for Proving Contract-Equipped Classes
r in: Abstract State Machines 2003 — Advances in Theory and Applications, Proc. 10th International Workshop, Taormina, Italy, March 3-7, 2003, eds. Egon Boerger, Angelo Gargantin...
Bertrand Meyer
APPROX
2010
Springer
139views Algorithms» more  APPROX 2010»
15 years 5 months ago
Two-Source Extractors Secure against Quantum Adversaries
We initiate the study of multi-source extractors in the quantum world. In this setting, our goal is to extract random bits from two independent weak random sources, on which two q...
Roy Kasher, Julia Kempe