Sciweavers

FUIN
2010
101views more  FUIN 2010»
13 years 9 months ago
Infinite Product of Traces Represented by Projections
The construction of an associative -product of traces from an earlier paper is revisited using projection representation of traces. Using projections instead of trace prefixes res...
Roman R. Redziejowski
EJC
2007
14 years 3 hour ago
The structure of the 3-separations of 3-connected matroids II
The authors showed in an earlier paper that there is a tree that displays, up to a natural equivalence, all non-trivial 3-separations of a 3-connected matroid. The purpose of this ...
James G. Oxley, Charles Semple, Geoff Whittle
MOC
2002
71views more  MOC 2002»
14 years 3 days ago
On a problem of Byrnes concerning polynomials with restricted coefficients, II
As in the earlier paper with this title, we consider a question of Byrnes concerning the minimal length N(m) of a polynomial with all coeffi
David W. Boyd
AUTOMATICA
2004
87views more  AUTOMATICA 2004»
14 years 9 days ago
Exponential stabilization of the rolling sphere
Abstract-- In an earlier paper [3], we addressed the problem of stabilization of the rolling sphere about any desired configuration. For the controller proposed in [3], we establis...
Tuhin Das, Ranjan Mukherjee
APCHI
2004
IEEE
14 years 4 months ago
NetWorker: A Practical Web-Based Tool to Support the Collect-Compare-Choose Cycle
An earlier paper has covered the development of a paper prototype of NetWorker, a tool designed to facilitate a Web usage referred to as the Collect-Compare-Choose cycle. Here we d...
Paul J. Lyons, Chris Phillips, Elizabeth A. Kemp, ...
SIGCOMM
1994
ACM
14 years 4 months ago
Experiences of Building an ATM Switch for the Local Area
The Fairisle project was concerned with ATM in the local area. An earlier paper 9] described the preliminary work and plans for the project. Here we present the experiences we hav...
Richard Black, Ian M. Leslie, Derek McAuley
SPC
2005
Springer
14 years 6 months ago
Exploiting Empirical Engagement in Authentication Protocol Design
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...