Sciweavers

819 search results - page 144 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
127
Voted
AMW
2010
15 years 3 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
ESWA
2006
149views more  ESWA 2006»
15 years 2 months ago
An effective refinement strategy for KNN text classifier
Due to the exponential growth of documents on the Internet and the emergent need to organize them, the automated categorization of documents into predefined labels has received an...
Songbo Tan
ASMTA
2010
Springer
192views Mathematics» more  ASMTA 2010»
15 years 15 days ago
Packet Loss Minimization in Load-Balancing Switch
Due to the overall growing demand on the network resources and tight restrictions on the power consumption, the requirements to the long-term scalability, cost and performance capa...
Yury Audzevich, Levente Bodrog, Yoram Ofek, Mikl&o...
261
Voted
RTAS
2011
IEEE
14 years 6 months ago
Deterministic and Stochastic QoS Provision for Real-Time Control Systems
—In this paper, we propose two adaptive scheduling approaches to support real-time control applications with highly varying computation times. The use of a resource reservation s...
Daniele Fontanelli, Luigi Palopoli, Luca Greco
130
Voted
MOBIHOC
2002
ACM
16 years 2 months ago
On the minimum node degree and connectivity of a wireless multihop network
This paper investigates two fundamental characteristics of a wireless multihop network: its minimum node degree and its k?connectivity. Both topology attributes depend on the spat...
Christian Bettstetter