Sciweavers

CJ
2002
81views more  CJ 2002»
13 years 10 months ago
A Multi-channel MAC Protocol with Power Control for Multi-hop Mobile Ad Hoc Networks
Shih-Lin Wu, Yu-Chee Tseng, Chih-Yu Lin, Jang-Ping...
CJ
2002
81views more  CJ 2002»
13 years 10 months ago
Lower Bounds for One-to-one Packet Routing on Trees using Hot-Potato Algorithms
Alan Roberts, Antonios Symvonis, David R. Wood
CJ
2002
61views more  CJ 2002»
13 years 10 months ago
RASCAL: Calculation of Graph Similarity using Maximum Common Edge Subgraphs
John W. Raymond, Eleanor J. Gardiner, Peter Willet...
CJ
2002
70views more  CJ 2002»
13 years 10 months ago
Formal Methods for Assuring Security of Protocols
l examination of the underlying assumptions, abstractions, and possible actions. Consequently, assuring that a system behaves securely is virtually impossible without the use of ri...
Susan Older, Shiu-Kai Chin
CJ
2002
73views more  CJ 2002»
13 years 10 months ago
A Thread of HOL Development
Michael Norrish, Konrad Slind
CJ
2002
67views more  CJ 2002»
13 years 10 months ago
Using Bloom Filters to Speed-up Name Lookup in Distributed Systems
Bloom filters make use of a "probabilistic" hash-coding method to reduce the amount of space required to store a hash set. A Bloom filter offers a trade-off between its ...
Mark C. Little, Santosh K. Shrivastava, Neil A. Sp...
CJ
2002
65views more  CJ 2002»
13 years 10 months ago
Reverse Execution of Java Bytecode
Jonathan J. Cook
CJ
2002
65views more  CJ 2002»
13 years 10 months ago
Report on the EFIS 2001 Workshop
Stefan Conrad, Wilhelm Hasselbring, Anne E. James,...