Sciweavers

4356 search results - page 856 / 872
» Communicating Transactions - (Extended Abstract)
Sort
View
ICDCS
2010
IEEE
13 years 9 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
COLING
2008
13 years 8 months ago
A Hybrid Generative/Discriminative Framework to Train a Semantic Parser from an Un-annotated Corpus
We propose a hybrid generative/discriminative framework for semantic parsing which combines the hidden vector state (HVS) model and the hidden Markov support vector machines (HMSV...
Deyu Zhou, Yulan He
DAGSTUHL
2007
13 years 8 months ago
End-User Development Techniques for Enterprise Resource Planning Software Systems
Abstract. The intent of this position paper is to present the focus of interest of our end-user development (EUD) related research at SAP Research CEC Darmstadt, enabling other par...
Michael Spahn, Stefan Scheidl, Todor Stoitsev
DIMVA
2008
13 years 8 months ago
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
Abstract. This paper presents a novel framework to substantiate selfsigned certificates in the absence of a trusted certificate authority. In particular, we aim to address the prob...
Brett Stone-Gross, David Sigal, Rob Cohn, John Mor...