Sciweavers

1497 search results - page 230 / 300
» A Computational Model for Message Passing
Sort
View
ACII
2007
Springer
14 years 2 months ago
Textual Affect Sensing for Sociable and Expressive Online Communication
In this paper, we address the tasks of recognition and interpretation of affect communicated through text messaging. The evolving nature of language in online conversations is a ma...
Alena Neviarouskaya, Helmut Prendinger, Mitsuru Is...
ICDCSW
2006
IEEE
14 years 2 months ago
Reducing Latency in Rendezvous-Based Publish-Subscribe Systems for Wireless Ad Hoc Networks
To ensure decoupling between publishers and subscribers, most publish-subscribe systems route notifications through intermediate message brokers. A byproduct of this practice is ...
Nuno Carvalho, Filipe Araújo, Luís R...
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
14 years 1 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
ICPADS
2002
IEEE
14 years 1 months ago
Self-Stabilizing Wormhole Routing on Ring Networks
Wormhole routing is most common in parallel architectures in which messages are sent in small fragments called flits. It is a lightweight and efficient method of routing message...
Ajoy Kumar Datta, Maria Gradinariu, Anthony B. Ken...
PODC
1994
ACM
14 years 3 days ago
A Checkpoint Protocol for an Entry Consistent Shared Memory System
Workstation clusters are becoming an interesting alternative to dedicated multiprocessors. In this environment, the probability of a failure, during an application's executio...
Nuno Neves, Miguel Castro, Paulo Guedes