Sciweavers

21520 search results - page 4111 / 4304
» Symmetric network computation
Sort
View
150
Voted
FAC
2010
140views more  FAC 2010»
15 years 1 months ago
From a domain analysis to the specification and detection of code and design smells
Code and design smells are recurring design problems in software systems that must be identified to avoid their possible negative consequences on development and maintenance. Conse...
Naouel Moha, Yann-Gaël Guéhéneu...
IJWMC
2010
103views more  IJWMC 2010»
15 years 1 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
144
Voted
INFORMS
2010
147views more  INFORMS 2010»
15 years 1 months ago
Exact Algorithms for the Quadratic Linear Ordering Problem
The quadratic linear ordering problem naturally generalizes various optimization problems, such as bipartite crossing minimization or the betweenness problem, which includes linear...
Christoph Buchheim, Angelika Wiegele, Lanbo Zheng
159
Voted
ISCI
2010
146views more  ISCI 2010»
15 years 1 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
CCR
2011
14 years 11 months ago
Application flow control in YouTube video streams
This paper presents the results of an investigation into the application flow control technique utilised by YouTube. We reveal and describe the basic properties of YouTube applic...
Shane Alcock, Richard Nelson
« Prev « First page 4111 / 4304 Last » Next »