Sciweavers

534 search results - page 87 / 107
» Proving Termination of Rewrite Systems Using Bounds
Sort
View
DNA
2007
Springer
176views Bioinformatics» more  DNA 2007»
14 years 3 months ago
Asynchronous Spiking Neural P Systems: Decidability and Undecidability
In search for “realistic” bio-inspired computing models, we consider asynchronous spiking neural P systems, in the hope to get a class of computing devices with decidable prope...
Matteo Cavaliere, Ömer Egecioglu, Oscar H. Ib...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 9 months ago
High-SIR Transmission Capacity of Wireless Networks with General Fading and Node Distribution
In many wireless systems, interference is the main performance-limiting factor, and is primarily dictated by the locations of concurrent transmitters. In many earlier works, the l...
Radha Krishna Ganti, Jeffrey G. Andrews, Martin Ha...
WSC
2004
13 years 10 months ago
An Adaptive Approach to Fast Simulation of Traffic Groomed Optical Networks
In this paper, we consider the fast simulation of traffic groomed optical networks, in which multiple sub-rate traffic streams may be carried on the same wavelength. For real-size...
Chih-Chieh Hsu, Michael Devetsikiotis
ESORICS
2009
Springer
14 years 9 months ago
The Wisdom of Crowds: Attacks and Optimal Constructions
We present a traffic analysis of the ADU anonymity scheme presented at ESORICS 2008, and the related RADU scheme. We show that optimal attacks are able to de-anonymize messages mor...
Carmela Troncoso, Claudia Díaz, Emilia K&au...
PODS
2003
ACM
157views Database» more  PODS 2003»
14 years 9 months ago
Algorithms for data migration with cloning
Our work is motivated by the problem of managing data on storage devices, typically a set of disks. Such high demand storage servers are used as web servers, or multimedia servers...
Samir Khuller, Yoo Ah Kim, Yung-Chun (Justin) Wan