Sciweavers

2421 search results - page 102 / 485
» Message from the Co-Chairs
Sort
View
JSAC
2007
87views more  JSAC 2007»
13 years 9 months ago
Hidden-Action in Network Routing
— In communication networks, such as the Internet or mobile ad-hoc networks, the actions taken by intermediate nodes or links are typically hidden from the communicating endpoint...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
JSW
2007
126views more  JSW 2007»
13 years 9 months ago
Supporting UML Sequence Diagrams with a Processor Net Approach
— UML sequence diagrams focus on the interaction between different classes. For distributed real time transaction processing it is possible to end up with complex sequence diagra...
Tony Spiteri Staines
COLING
2002
13 years 9 months ago
Towards a Noise-Tolerant, Representation-Independent Mechanism for Argument Interpretation
We describe a mechanism for the interpretation of arguments, which can cope with noisy conditions in terms of wording, beliefs and argument structure. This is achieved through the...
Ingrid Zukerman, Sarah George
IPL
2000
101views more  IPL 2000»
13 years 9 months ago
Visual cryptography for grey level images
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of parti...
Carlo Blundo, Alfredo De Santis, Moni Naor
ICRA
2010
IEEE
153views Robotics» more  ICRA 2010»
13 years 7 months ago
Communication-based leashing of real flying robots
—— Aerial robots are often required to remain within the communication range of a base station on the ground to exchange commands, sensor data or as a safety mechanism. For this...
Sabine Hauert, Severin Leven, Jean-Christophe Zuff...