Sciweavers

20175 search results - page 3935 / 4035
» Is abstraction the key to computing
Sort
View
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
14 years 4 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
CMC
1998
Springer
14 years 2 months ago
The IntelliMedia WorkBench - An Environment for Building Multimodal Systems
Abstract. Intelligent MultiMedia (IntelliMedia) focuses on the computer processing and understanding of signal and symbol input from at least speech, text and visual images in term...
Tom Brøndsted, Paul Dalsgaard, Lars Bo Lars...
MOBIHOC
2008
ACM
14 years 9 months ago
Multicast capacity for hybrid wireless networks
We study the multicast capacity of a random wireless network consisting of ordinary wireless nodes and base stations, known as a hybrid network. Assume that n ordinary wireless no...
XuFei Mao, Xiang-Yang Li, ShaoJie Tang
CIKM
2007
Springer
14 years 4 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
ICFP
1999
ACM
14 years 2 months ago
Programming Languages as Operating Systems (or Revenge of the Son of the Lisp Machine)
The MrEd virtual machine serves both as the implementation platform for the DrScheme programming environment, and as the underlying Scheme engine for executing expressions and pro...
Matthew Flatt, Robert Bruce Findler, Shriram Krish...
« Prev « First page 3935 / 4035 Last » Next »