Sciweavers

2421 search results - page 162 / 485
» Message from the Co-Chairs
Sort
View
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
CORR
2008
Springer
160views Education» more  CORR 2008»
13 years 9 months ago
Degrees of Freedom of the MIMO Interference Channel with Cooperation and Cognition
In this paper, we explore the benefits, from the perspective of degrees of freedom (DOF), of user cooperation and cognitive message sharing for a two-user multiple-input-multiple-...
Chiachi Huang, Syed Ali Jafar
INFORMATICALT
2006
88views more  INFORMATICALT 2006»
13 years 9 months ago
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques
Abstract. The asynchronous techniques that exist within the programming with distributed constraints are characterized by the occurrence of the nogood values during the search for ...
Ionel Muscalagiu, Vladimir Cretu
CCR
2004
157views more  CCR 2004»
13 years 9 months ago
Designing BGP-based outbound traffic engineering techniques for stub ASes
Today, most multi-connected autonomous systems (AS) need to control the flow of their interdomain traffic for both performance and economical reasons. This is usually done by manu...
Steve Uhlig, Olivier Bonaventure
CSCW
2002
ACM
13 years 9 months ago
Work rhythms: analyzing visualizations of awareness histories of distributed groups
We examined records of minute-by-minute computer activity coupled with information about the location of the activity, online calendar appointments, and e-mail activity. We presen...
James Begole, John C. Tang, Randall B. Smith, Nico...