Sciweavers

1485 search results - page 55 / 297
» connection 2010
Sort
View
AINA
2010
IEEE
13 years 9 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...
GMP
2010
IEEE
190views Solid Modeling» more  GMP 2010»
14 years 2 months ago
A Subdivision Approach to Planar Semi-algebraic Sets
Abstract. Semi-algebraic sets occur naturally when dealing with implicit models and boolean operations between them. In this work we present an algorithm to efficiently and in a ce...
Angelos Mantzaflaris, Bernard Mourrain
STOC
2010
ACM
211views Algorithms» more  STOC 2010»
14 years 2 months ago
Distributed Computation in Dynamic Networks
In this paper we investigate distributed computation in dynamic networks in which the network topology changes from round to round. We consider a worst-case model in which the com...
Fabian Kuhn, Nancy Lynch and Rotem Oshman
ADHOC
2010
126views more  ADHOC 2010»
13 years 10 months ago
Stable energy-aware topology management in ad hoc networks
Abstract-- The efficiency of a communication network depends not only on its control protocols, but also on the underlying network topology. We propose a distributed topology manag...
Lichun Bao, J. J. Garcia-Luna-Aceves
CII
2010
87views more  CII 2010»
13 years 10 months ago
The Unified Enterprise Modelling Language - Overview and further work
: The Unified Enterprise Modelling Language (UEML) aims to support integrated use of enterprise and IS models expressed in a variety of languages. The achieve this aim, UEML provid...
Víctor Anaya, Giuseppe Berio, Mounira Harza...