Sciweavers

767 search results - page 146 / 154
» Network Coding for Wireless Mesh Networks: A Case Study
Sort
View
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
CORR
2007
Springer
156views Education» more  CORR 2007»
13 years 7 months ago
Capacity Gain from Two-Transmitter and Two-Receiver Cooperation
Abstract—Capacity improvement from transmitter and receiver cooperation is investigated in a two-transmitter, two-receiver network with phase fading and full channel state inform...
Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith,...
FORTE
2011
12 years 10 months ago
A Framework for Verifying Data-Centric Protocols
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
Yuxin Deng, Stéphane Grumbach, Jean-Fran&cc...
LADC
2005
Springer
14 years 25 days ago
Quantitative Evaluation of Distributed Algorithms Using the Neko Framework: The NekoStat Extension
In this paper we present NekoStat, an extension of the Neko tool. Neko is a Java framework and a communication platform that permits rapid prototyping of distributed applications; ...
Lorenzo Falai, Andrea Bondavalli, Felicita Di Gian...
LCPC
2001
Springer
13 years 11 months ago
A Compilation Framework for Power and Energy Management on Mobile Computers
This paper discusses the potential benefits of applicationspecific power management through remote task execution. Power management is crucial for mobile devices that have to re...
Ulrich Kremer, Jamey Hicks, James M. Rehg