Sciweavers

2421 search results - page 159 / 485
» Message from the Co-Chairs
Sort
View
CCR
2000
78views more  CCR 2000»
13 years 9 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 8 months ago
Sum-Capacity and the Unique Separability of the Parallel Gaussian MAC-Z-BC Network
—THIS PAPER IS ELIGIBLE FOR THE STUDENT PAPER AWARD. It is known that the capacity of parallel (e.g., multi-carrier) Gaussian point-to-point, multiple access and broadcast channe...
Viveck R. Cadambe, Syed Ali Jafar
ACL
2010
13 years 7 months ago
An Exact A* Method for Deciphering Letter-Substitution Ciphers
Letter-substitution ciphers encode a document from a known or hypothesized language into an unknown writing system or an unknown encoding of a known writing system. It is a proble...
Eric Corlett, Gerald Penn
ACL
2010
13 years 7 months ago
Finding Cognate Groups Using Phylogenies
A central problem in historical linguistics is the identification of historically related cognate words. We present a generative phylogenetic model for automatically inducing cogn...
David Hall, Dan Klein
ESORICS
2002
Springer
14 years 9 months ago
Analysing a Stream Authentication Protocol Using Model Checking
Abstract. In this paper, we consider how one can analyse a stream authentication protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient...
Philippa J. Broadfoot, Gavin Lowe