Sciweavers

2642 search results - page 99 / 529
» The development of Chez Scheme
Sort
View
INFOCOM
1995
IEEE
14 years 1 months ago
Address Management and Connection Control for Multicast Communication Applications
An architecture and associated protocols are presented for managing multicast addresses and performing connection control for applications that use multicast communication faciliti...
Alexandros Eleftheriadis, Sassan Pejhan, Dimitris ...
MPC
1995
Springer
150views Mathematics» more  MPC 1995»
14 years 1 months ago
Architecture Independent Massive Parallelization of Divide-and-Conquer Algorithms
Abstract. We present a strategy to develop, in a functional setting, correct, e cient and portable Divide-and-Conquer (DC) programs for massively parallel architectures. Starting f...
Klaus Achatz, Wolfram Schulte
SIGCOMM
1995
ACM
14 years 1 months ago
A Mobile User Location Update and Paging Mechanism Under Delay Constraints
A mobile user location management mechanism is introduced that incorporates a distance based location update scheme and a paging mechanism that satis es prede ned delay requiremen...
Ian F. Akyildiz, Joseph S. M. Ho
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
14 years 1 months ago
Adaptive control for plants in the presence of actuator and sensor hysteresis nonlinearities
-This paper discusses the output control for a linear plant containing uncertain hysteresis nonlinearities in actuator and sensor devices simultaneously, where the hysteresis is de...
Xinkai Chen, Toshikuni Ozaki
CISC
2008
Springer
118views Cryptology» more  CISC 2008»
13 years 12 months ago
Inter-domain Identity-Based Proxy Re-encryption
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
Qiang Tang, Pieter H. Hartel, Willem Jonker