Sciweavers

976 search results - page 62 / 196
» Evaluating Adversarial Partitions
Sort
View
154
Voted
ICC
2011
IEEE
269views Communications» more  ICC 2011»
14 years 3 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino
160
Voted
QEST
2007
IEEE
15 years 10 months ago
Symbolic Bisimulations for Probabilistic Systems
The paper introduces symbolic bisimulations for a simple probabilistic π-calculus to overcome the infinite branching problem that still exists in checking ground bisimulations b...
Peng Wu 0002, Catuscia Palamidessi, Huimin Lin
131
Voted
CRYPTO
2006
Springer
97views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Robust Multiparty Computation with Linear Communication Complexity
We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a polytime adversary, and allows n parties to actively secur...
Martin Hirt, Jesper Buus Nielsen
111
Voted
TCSV
2002
108views more  TCSV 2002»
15 years 3 months ago
Pilot-assisted 16-level QAM for wireless video
This paper presents a twin-class transmission system for narrowband radio access channels suitable for handheld video phone and multimedia portable PC applications. The transmissio...
Hamid Gharavi
119
Voted
ICDM
2007
IEEE
192views Data Mining» more  ICDM 2007»
15 years 10 months ago
Discovering Temporal Communities from Social Network Documents
Discovering communities from documents involved in social discourse is an important topic in social network analysis, enabling greater understanding of the relationships among act...
Ding Zhou, Isaac G. Councill, Hongyuan Zha, C. Lee...