Abstract: This paper considers the problem of distributively verifying and ensuring strong connectivity of directed networks. Strong connectivity of a directed graph associated with the communication ...
Abstract: In today's Internet, the security of data exchange is possible almost entirely thanks to the RSA algorithm. The asymmetric cryptographic algorithm with the public key allows you to safely ...
In "A Lazy Concurrent List-Based Set Algorithm", Heller et al., present a concurrent, list-based set algorithm in which insertion and removal operations are optimistic, removal operations are lazy ...
Directories/files denoted with * are not within the scope of this paper. . ├── sets* # Dependency: Library for set theory ├── fixedpoints* # Dependency: Library for order theory and fixed points ├── ...
ABSTRACT The Advanced Microwave Sounding Unit (AMSU) images display strong dependence on the scanning angle because of the temperature gradient of the atmosphere and the change in the optical ...
某些結果已隱藏,因為您可能無法存取這些結果。
顯示無法存取的結果