Sciweavers

2478 search results - page 240 / 496
» Message from the Chair
Sort
View
CCR
2000
78views more  CCR 2000»
15 years 4 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 3 months ago
Sum-Capacity and the Unique Separability of the Parallel Gaussian MAC-Z-BC Network
—THIS PAPER IS ELIGIBLE FOR THE STUDENT PAPER AWARD. It is known that the capacity of parallel (e.g., multi-carrier) Gaussian point-to-point, multiple access and broadcast channe...
Viveck R. Cadambe, Syed Ali Jafar
ACL
2010
15 years 2 months ago
An Exact A* Method for Deciphering Letter-Substitution Ciphers
Letter-substitution ciphers encode a document from a known or hypothesized language into an unknown writing system or an unknown encoding of a known writing system. It is a proble...
Eric Corlett, Gerald Penn
ACL
2010
15 years 2 months ago
Finding Cognate Groups Using Phylogenies
A central problem in historical linguistics is the identification of historically related cognate words. We present a generative phylogenetic model for automatically inducing cogn...
David Hall, Dan Klein
WWW
2007
ACM
16 years 5 months ago
Optimized query planning of continuous aggregation queries in dynamic data dissemination networks
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Krithi Ramamritham