Sciweavers

798 search results - page 116 / 160
» Proving More Properties with Bounded Model Checking
Sort
View
TAMC
2010
Springer
14 years 21 days ago
Streaming Algorithms for Some Problems in Log-Space
Abstract. In this paper, we give streaming algorithms for some problems which are known to be in deterministic log-space, when the number of passes made on the input is unbounded. ...
Ajesh Babu, Nutan Limaye, Girish Varma
INFOCOM
2010
IEEE
13 years 6 months ago
Non-Preemptive Buffer Management for Latency Sensitive Packets
—The delivery of latency sensitive packets is a crucial issue in real time applications of communication networks. Such packets often have a firm deadline and a packet becomes u...
Moran Feldman, Joseph Naor
ICCCN
2008
IEEE
14 years 2 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
13 years 11 months ago
Advanced Lagrange Multiplier Selection for Hybrid Video Coding
The Lagrangian multiplier based rate-distortion optimization has been proved to be an effective way in hybrid video coding. In this paper, an advanced Lagrange multiplier selectio...
Xiang Li, Norbert Oertel, Andreas Hutter, Andr&eac...
CSFW
2002
IEEE
14 years 18 days ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe