Sciweavers

767 search results - page 146 / 154
» Network Coding for Wireless Mesh Networks: A Case Study
Sort
View
DSN
2008
IEEE
15 years 5 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
118
Voted
CORR
2007
Springer
156views Education» more  CORR 2007»
15 years 3 months ago
Capacity Gain from Two-Transmitter and Two-Receiver Cooperation
Abstract—Capacity improvement from transmitter and receiver cooperation is investigated in a two-transmitter, two-receiver network with phase fading and full channel state inform...
Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith,...
227
Voted
FORTE
2011
14 years 7 months ago
A Framework for Verifying Data-Centric Protocols
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
Yuxin Deng, Stéphane Grumbach, Jean-Fran&cc...
113
Voted
LADC
2005
Springer
15 years 9 months ago
Quantitative Evaluation of Distributed Algorithms Using the Neko Framework: The NekoStat Extension
In this paper we present NekoStat, an extension of the Neko tool. Neko is a Java framework and a communication platform that permits rapid prototyping of distributed applications; ...
Lorenzo Falai, Andrea Bondavalli, Felicita Di Gian...
144
Voted
LCPC
2001
Springer
15 years 8 months ago
A Compilation Framework for Power and Energy Management on Mobile Computers
This paper discusses the potential benefits of applicationspecific power management through remote task execution. Power management is crucial for mobile devices that have to re...
Ulrich Kremer, Jamey Hicks, James M. Rehg