Sciweavers

505 search results - page 28 / 101
» Message from General Co-Chairs
Sort
View
IPPS
1993
IEEE
14 years 1 months ago
New Wormhole Routing Algorithms for Multicomputers
Abstract. Development of wormhole routing techniques so far has been largely independent of the results available for store-and-forward routing in literature. In this paper, we pro...
Rajendra V. Boppana, Suresh Chalasani
SIGIR
2010
ACM
13 years 9 months ago
Hashtag retrieval in a microblogging environment
Microblog services let users broadcast brief textual messages to people who "follow" their activity. Often these posts contain terms called hashtags, markers of a post&#...
Miles Efron
CCR
2000
78views more  CCR 2000»
13 years 8 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 7 months ago
Sum-Capacity and the Unique Separability of the Parallel Gaussian MAC-Z-BC Network
—THIS PAPER IS ELIGIBLE FOR THE STUDENT PAPER AWARD. It is known that the capacity of parallel (e.g., multi-carrier) Gaussian point-to-point, multiple access and broadcast channe...
Viveck R. Cadambe, Syed Ali Jafar
ACL
2010
13 years 7 months ago
An Exact A* Method for Deciphering Letter-Substitution Ciphers
Letter-substitution ciphers encode a document from a known or hypothesized language into an unknown writing system or an unknown encoding of a known writing system. It is a proble...
Eric Corlett, Gerald Penn