Sciweavers

CORR
2010
Springer
122views Education» more  CORR 2010»
13 years 7 months ago
Specifying Reusable Components
Reusable software components need well-defined interfaces, rigorously and completely documented features, and a design amenable both to reuse and to formal verification; all these...
Nadia Polikarpova, Carlo A. Furia, Bertrand Meyer
CORR
2010
Springer
43views Education» more  CORR 2010»
13 years 7 months ago
BitTorrent Experiments on Testbeds: A Study of the Impact of Network Latencies
Ashwin Rao, Arnaud Legout, Walid Dabbous
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 7 months ago
Predicting the Future with Social Media
In recent years, social media has become ubiquitous and important for social networking and content sharing. And yet, the content that is generated from these websites remains larg...
Sitaram Asur, Bernardo A. Huberman
CORR
2010
Springer
205views Education» more  CORR 2010»
13 years 7 months ago
Competition with Dynamic Spectrum Leasing
Dynamic spectrum leasing can greatly enhance the spectrum efficiency and encourage more flexible services in the spectrum market. This paper presents a detailed analytical study of...
Lingjie Duan, Jianwei Huang, Biying Shou
CORR
2010
Springer
60views Education» more  CORR 2010»
13 years 7 months ago
A Note on Integer Factorization Using Lattices
We revisit Schnorr's lattice-based integer factorization algorithm, now with an effective point of view. We present effective versions of Theorem 2 of [11], as well as new pro...
Antonio Ignacio Vera
CORR
2010
Springer
55views Education» more  CORR 2010»
13 years 7 months ago
On a family of cubic graphs containing the flower snarks
We consider cubic graphs formed with k 2 disjoint claws Ci K1,3 (0 i k-1) such that for every integer i modulo k the three vertices of degree 1 of Ci are joined to the three v...
Jean-Luc Fouquet, Henri Thuillier, Jean-Marie Vanh...
CORR
2010
Springer
103views Education» more  CORR 2010»
13 years 7 months ago
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many pot...
Siva Rama Krishnan Somayaji, Ch. A. S. Murty
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 7 months ago
Spatial logics with connectedness predicates
Abstract. We consider quantifier-free spatial logics, designed for qualitative spatial representation and reasoning in AI, and extend them with the means to represent topological c...
Roman Kontchakov, Ian Pratt-Hartmann, Frank Wolter...
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 7 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade