Sciweavers

976 search results - page 62 / 196
» Evaluating Adversarial Partitions
Sort
View
ICC
2011
IEEE
269views Communications» more  ICC 2011»
12 years 8 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino
QEST
2007
IEEE
14 years 3 months ago
Symbolic Bisimulations for Probabilistic Systems
The paper introduces symbolic bisimulations for a simple probabilistic π-calculus to overcome the infinite branching problem that still exists in checking ground bisimulations b...
Peng Wu 0002, Catuscia Palamidessi, Huimin Lin
CRYPTO
2006
Springer
97views Cryptology» more  CRYPTO 2006»
14 years 19 days ago
Robust Multiparty Computation with Linear Communication Complexity
We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a polytime adversary, and allows n parties to actively secur...
Martin Hirt, Jesper Buus Nielsen
TCSV
2002
108views more  TCSV 2002»
13 years 8 months ago
Pilot-assisted 16-level QAM for wireless video
This paper presents a twin-class transmission system for narrowband radio access channels suitable for handheld video phone and multimedia portable PC applications. The transmissio...
Hamid Gharavi
ICDM
2007
IEEE
192views Data Mining» more  ICDM 2007»
14 years 3 months ago
Discovering Temporal Communities from Social Network Documents
Discovering communities from documents involved in social discourse is an important topic in social network analysis, enabling greater understanding of the relationships among act...
Ding Zhou, Isaac G. Councill, Hongyuan Zha, C. Lee...