Sciweavers

2873 search results - page 232 / 575
» Model Checking and the Mu-calculus
Sort
View
AHSWN
2010
130views more  AHSWN 2010»
15 years 4 months ago
How Good is Opportunistic Routing? - A Reality Check under Rayleigh Fading Channels
Considerations of realistic channel dynamics motivate the design of a new breed of opportunistic schemes, such as opportunistic transmission, scheduling and routing. Compared to t...
Rong Zheng, Chengzhi Li
SMI
2010
IEEE
165views Image Analysis» more  SMI 2010»
15 years 2 months ago
Designing a Topological Modeler Kernel: A Rule-Based Approach
In this article, we present a rule-based language dedicated to topological operations, based on graph transformations. Generalized maps are described as a particular class of graph...
Thomas Bellet, Mathieu Poudret, Agnès Arnou...
JSAC
2011
108views more  JSAC 2011»
14 years 11 months ago
A Model-Based Approach to Cognitive Radio Design
Abstract—Cognitive radio is a promising technology for fulfilling the spectrum and service requirements of future wireless communication systems. Real experimentation is a key f...
Jorg Lotze, Suhaib A. Fahmy, Juanjo Noguera, Linda...
ASIACRYPT
2003
Springer
15 years 10 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
CORR
2011
Springer
165views Education» more  CORR 2011»
14 years 11 months ago
Extracting Features from Ratings: The Role of Factor Models
Abstract. Performing effective preference-based data retrieval requires detailed and preferentially meaningful structurized information about the current user as well as the items ...
Joachim Selke, Wolf-Tilo Balke