Sciweavers

592 search results - page 41 / 119
» Competition, Cooperation, and Authorization
Sort
View
ICICS
2010
Springer
13 years 5 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
JSAC
2008
123views more  JSAC 2008»
13 years 7 months ago
A Game Theoretical Framework for Dynamic Pricing-Based Routing in Self-Organized MANETs
In self-organized mobile ad hoc networks (MANETs) where each user is its own authority, fully cooperative behaviors, such as unconditionally forwarding packets for each other or ho...
Zhu Ji, Wei Yu, K. J. Ray Liu
SECON
2010
IEEE
13 years 5 months ago
Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices
Abstract--Today's mobile devices support many wireless technologies to achieve ubiquitous connectivity. Economic and energy constraints, however, drive the industry to impleme...
Lei Yang, Vinod Kone, Xue Yang, York Liu, Ben Y. Z...
ACL
2012
11 years 10 months ago
Tweet Recommendation with Graph Co-Ranking
As one of the most popular micro-blogging services, Twitter attracts millions of users, producing millions of tweets daily. Shared information through this service spreads faster ...
Rui Yan, Mirella Lapata, Xiaoming Li
NIPS
2004
13 years 9 months ago
Result Analysis of the NIPS 2003 Feature Selection Challenge
The NIPS 2003 workshops included a feature selection competition organized by the authors. We provided participants with five datasets from different application domains and calle...
Isabelle Guyon, Steve R. Gunn, Asa Ben-Hur, Gideon...