Sciweavers

284 search results - page 38 / 57
» di 2006
Sort
View
JGAA
2008
97views more  JGAA 2008»
13 years 7 months ago
Drawing Bipartite Graphs on Two Parallel Convex Curves
Let G be a bipartite graph, and let e, i be two parallel convex curves; we study the question about whether G admits a planar straight-line drawing such that the vertices of one p...
Emilio Di Giacomo, Luca Grilli, Giuseppe Liotta
APPML
2007
75views more  APPML 2007»
13 years 7 months ago
Analysis of substructuring preconditioners for mortar methods in an abstract framework
framework Silvia Bertoluzza∗, Micol Pennacchio Istituto di Matematica Applicata e Tecnologie Informatiche del C.N.R., v. Ferrata 1, 27100 Pavia, Italy Received 16 February 2006; ...
Silvia Bertoluzza, Micol Pennacchio
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
14 years 1 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
JAIR
1998
195views more  JAIR 1998»
13 years 7 months ago
AntNet: Distributed Stigmergetic Control for Communications Networks
This paper introduces AntNet, a novel approach to the adaptive learning of routing tables in communications networks. AntNet is a distributed, mobile agents based Monte Carlo syst...
Gianni Di Caro, Marco Dorigo
INFSOF
2002
153views more  INFSOF 2002»
13 years 7 months ago
Analyzing cloning evolution in the Linux kernel
Identifying code duplication in large multi-platform software systems is a challenging problem. This is due to a variety of reasons including the presence of high-level programmin...
Giuliano Antoniol, Umberto Villano, Ettore Merlo, ...