Sciweavers

2478 search results - page 405 / 496
» Message from the Chair
Sort
View
CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 10 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
CORR
2008
Springer
101views Education» more  CORR 2008»
13 years 10 months ago
Sublinear Communication Protocols for Multi-Party Pointer Jumping and a Related Lower Bound
We study the one-way number-on-the-forehead (NOF) communication complexity of the k-layer pointer jumping problem with n vertices per layer. This classic problem, which has connec...
Joshua Brody, Amit Chakrabarti
CORR
2008
Springer
138views Education» more  CORR 2008»
13 years 10 months ago
An Improved Robust Fuzzy Extractor
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W to agree on a secret key R in the presence of an active ...
Bhavana Kanukurthi, Leonid Reyzin
DSS
2008
146views more  DSS 2008»
13 years 10 months ago
Design choices for agent-based control of AGVs in the dough making process
In this paper we consider a multi-agent system (MAS) for the logistics control of Automatic Guided Vehicles (AGVs) that are used in the dough making process at an industrial baker...
Martijn Mes, Matthieu van der Heijden, Jos van Hil...
ENTCS
2008
83views more  ENTCS 2008»
13 years 10 months ago
Controlling Control Flow in Web Applications
Control flow is often key problem in current web applications. For example, using the back button gives a POSTDATA error, using multiple windows books the wrong hotel, and sending...
Robin Message, Alan Mycroft