Sciweavers

40212 search results - page 7988 / 8043
» More
Sort
View
COMSUR
2011
196views Hardware» more  COMSUR 2011»
12 years 9 months ago
From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols
—In large networks, a data source may not reach the intended sink in a single hop, thereby requiring the traffic to be routed via multiple hops. An optimized choice of such rout...
Thomas Watteyne, Antonella Molinaro, Maria Grazia ...
CONCUR
2011
Springer
12 years 9 months ago
Reasoning about Threads with Bounded Lock Chains
The problem of model checking threads interacting purely via the standard synchronization primitives is key for many concurrent program analyses, particularly dataflow analysis. U...
Vineet Kahlon
COSIT
2011
Springer
269views GIS» more  COSIT 2011»
12 years 9 months ago
Analyzing the Spatial-Semantic Interaction of Points of Interest in Volunteered Geographic Information
With the increasing success and commercial integration of Volunteered Geographic Information (VGI), the focus shifts away from coverage to data quality and homogeneity. Within the ...
Christoph Mülligann, Krzysztof Janowicz, Mao ...
CP
2011
Springer
12 years 9 months ago
Hierarchically Nested Convex VCSP
We introduce tractable classes of VCSP instances based on convex cost functions. Firstly, we show that the class of VCSP instances satisfying the hierarchically nested convexity pr...
Martin C. Cooper, Stanislav Zivny
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
« Prev « First page 7988 / 8043 Last » Next »