Sciweavers

24105 search results - page 4532 / 4821
» Models in Information Retrieval
Sort
View
149
Voted
PIMRC
2010
IEEE
15 years 2 months ago
Downlink capacity of two-tier cognitive femto networks
Abstract--In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of sever...
Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen
PROVSEC
2010
Springer
15 years 2 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
SECRYPT
2010
214views Business» more  SECRYPT 2010»
15 years 2 months ago
Nanonetworks - A New Frontier in Communications
Nanotechnology is enabling the development of devices in a scale ranging from one to a few one hundred nanometers. Nanonetworks, i.e., the interconnection of nano-scale devices, a...
Ian F. Akyildiz
SIGSOFT
2010
ACM
15 years 1 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan
129
Voted
UIST
2010
ACM
15 years 1 months ago
TurKit: human computation algorithms on mechanical turk
Mechanical Turk provides an on-demand source of human computation. This provides a tremendous opportunity to explore algorithms which incorporate human computation as a function c...
Greg Little, Lydia B. Chilton, Max Goldman, Robert...
« Prev « First page 4532 / 4821 Last » Next »