Sciweavers

193 search results - page 15 / 39
» A New Redundancy Reducing Cipher
Sort
View
IDC
2009
Springer
13 years 5 months ago
Efficient Broadcasting by Selective Forwarding
A major challenge faced in mobile ad hoc networks (MANETs) is locating devices for communication, especially in the case of high node mobility and sparse node density. Present solu...
Doina Bein, Ajoy Kumar Datta, Balaji Ashok Sathyan...
ICC
2000
IEEE
157views Communications» more  ICC 2000»
14 years 8 days ago
Adaptive Reliable Multicast
We present a new reliable multicast protocol, called ARM for Adaptive Reliable Multicast. Our protocol integrates ARQ and FEC techniques. The objectives of ARM are (1) reduce the ...
Jaehee Yoon, Azer Bestavros, Ibrahim Matta
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
14 years 1 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
EACL
2006
ACL Anthology
13 years 9 months ago
A Comparison of Syntactically Motivated Word Alignment Spaces
This work is concerned with the space of alignments searched by word alignment systems. We focus on situations where word re-ordering is limited by syntax. We present two new alig...
Colin Cherry, Dekang Lin
ICDM
2007
IEEE
96views Data Mining» more  ICDM 2007»
14 years 2 months ago
The Chosen Few: On Identifying Valuable Patterns
Constrained pattern mining extracts patterns based on their individual merit. Usually this results in far more patterns than a human expert or a machine learning technique could m...
Björn Bringmann, Albrecht Zimmermann