Sciweavers

913 search results - page 116 / 183
» Full Abstraction for Linda
Sort
View
PKC
2010
Springer
161views Cryptology» more  PKC 2010»
13 years 11 months ago
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
ded abstract of this paper appears in 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010, Lecture Notes in Computer Science Vol. ?, P. Nguye...
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vi...
AINA
2007
IEEE
13 years 10 months ago
Cross Layer Routing for Multihop Cellular Networks
Abstract— We propose a unified cross layer routing protocol with multiple constraints for CDMA multihop cellular networks (MCN). Multiple constraints are imposed on intermediate...
Govindan Kannan, Shabbir N. Merchant, Uday B. Desa...
ECTEL
2007
Springer
13 years 10 months ago
E-Learning on the Social Semantic Information Sources
Abstract. E-Learning grows on the fertile soil of the Internet technologies; it fails, however, to reach their full potential. With new, emerging technologies of the second generat...
Sebastian Ryszard Kruk, Adam Gzella, Jaroslaw Dobr...
CSL
2008
Springer
13 years 10 months ago
On Counting Generalized Colorings
Abstract. The notion of graph polynomials definable in Monadic Second Order Logic, MSOL, was introduced in [Mak04]. It was shown that the Tutte polynomial and its generalization, a...
Tomer Kotek, Johann A. Makowsky, Boris Zilber
DALT
2008
Springer
13 years 10 months ago
JASDL: A Practical Programming Approach Combining Agent and Semantic Web Technologies
Abstract. Although various ideas for integrating Semantic Web and Agent Programming techniques have appeared in the literature, as yet no practical programming approach has managed...
Thomas Klapiscak, Rafael H. Bordini