Sciweavers

1147 search results - page 157 / 230
» Termination in language-based systems
Sort
View
CHI
2008
ACM
14 years 10 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
MOBIHOC
2002
ACM
14 years 9 months ago
Performance evaluation of a fair backoff algorithm for IEEE 802.11 DFWMAC
Due to hidden terminals and a dynamic topology, contention among stations in an ad-hoc network is not homogeneous. Some stations are at a disadvantage in opportunity of access to ...
Zuyuan Fang, Brahim Bensaou, Yu Wang
MOBIHOC
2003
ACM
14 years 9 months ago
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks
Directional antennas in ad hoc networks offer many benefits compared with classical omnidirectional antennas. The most important include significant increase of spatial reuse, cov...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...
GLOBECOM
2009
IEEE
14 years 4 months ago
On the Performance of Compressed Interference Forwarding for Uplink Base Station Cooperation
Abstract—The capacity of today’s cellular mobile communications systems is mainly limited by inter-cell interference. Multi-cell joint transmission or joint detection schemes a...
Michael Grieger, Patrick Marsch, Gerhard Fettweis,...
KBSE
2005
IEEE
14 years 3 months ago
Learning to verify branching time properties
We present a new model checking algorithm for verifying computation tree logic (CTL) properties. Our technique is based on using language inference to learn the fixpoints necessar...
Abhay Vardhan, Mahesh Viswanathan