Sciweavers

1310 search results - page 226 / 262
» On a Class of Traceability Codes
Sort
View
CORR
2008
Springer
108views Education» more  CORR 2008»
13 years 7 months ago
Restricted Mobility Improves Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks
Abstract-- In this paper, we analyze asymptotic delaythroughput trade-offs in mobile ad-hoc networks comprising heterogeneous nodes with restricted mobility. We show that node spat...
Michele Garetto, Emilio Leonardi
CORR
2006
Springer
87views Education» more  CORR 2006»
13 years 7 months ago
Pseudorandomness and Combinatorial Constructions
Abstract. In combinatorics, the probabilistic method is a very powerful tool to prove the existence of combinatorial objects with interesting and useful properties. Explicit constr...
Luca Trevisan
CORR
2006
Springer
138views Education» more  CORR 2006»
13 years 7 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
IJFCS
2008
49views more  IJFCS 2008»
13 years 7 months ago
A Markovian Approach for the Analysis of the gene Structure
Hidden Markov models (HMMs) are effective tools to detect series of statistically homogeneous structures, but they are not well suited to analyse complex structures. Numerous meth...
Christelle Melo de Lima, Laurent Gueguen, Christia...
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 7 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald