Sciweavers

13214 search results - page 2501 / 2643
» Pseudorandomness for network algorithms
Sort
View
CSREASAM
2010
15 years 2 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...
FSTTCS
2010
Springer
15 years 2 months ago
Model checking time-constrained scenario-based specifications
We consider the problem of model checking message-passing systems with real-time requirements. As behavioural specifications, we use message sequence charts (MSCs) annotated with ...
S. Akshay, Paul Gastin, Madhavan Mukund, K. Naraya...
GLOBECOM
2010
IEEE
15 years 2 months ago
Distributed Transmit Beamforming with Autonomous and Self-Organizing Mobile Antennas
Abstract--The paper studies the problem of distributed transmit beamforming with autonomous and self-organizing mobile antennas. The objective is to design a distributed algorithm ...
Jian Hou, Zhiyun Lin, Wenyuan Xu, Gangfeng Yan
GLOBECOM
2010
IEEE
15 years 2 months ago
Deadline-Based Differentiation in P2P Streaming
Splitting a P2P video distribution in multiple media flows with different priorities is an interesting approach for developing flexible and adaptive streaming systems, ranging from...
Csaba Király, Renato Lo Cigno, Luca Abeni
ICDM
2010
IEEE
208views Data Mining» more  ICDM 2010»
15 years 2 months ago
Bonsai: Growing Interesting Small Trees
Graphs are increasingly used to model a variety of loosely structured data such as biological or social networks and entityrelationships. Given this profusion of large-scale graph ...
Stephan Seufert, Srikanta J. Bedathur, Juliá...
« Prev « First page 2501 / 2643 Last » Next »