Sciweavers

233 search results - page 19 / 47
» More Output-Sensitive Geometric Algorithms (Extended Abstrac...
Sort
View
JAR
2007
90views more  JAR 2007»
13 years 7 months ago
A Tableau Decision Procedure for SHOIQ
Abstract. OWL DL, a new W3C ontology language recommendation, is based on the expressive description logic SHOIN. Although the ontology consistency problem for SHOIN is known to be...
Ian Horrocks, Ulrike Sattler
CORR
2006
Springer
189views Education» more  CORR 2006»
13 years 7 months ago
Node-Based Optimal Power Control, Routing, and Congestion Control in Wireless Networks
Abstract--In wireless networks, important network functionalities such as power control, rate allocation, routing, and congestion control must be optimized in a coherent and integr...
Yufang Xi, Edmund M. Yeh
MOBIHOC
2006
ACM
14 years 7 months ago
Mobile backbone networks --: construction and maintenance
We study a novel hierarchical wireless networking approach in which some of the nodes are more capable than others. In such networks, the more capable nodes can serve as Mobile Ba...
Anand Srinivas, Gil Zussman, Eytan Modiano
COMPSYSTECH
2011
12 years 7 months ago
Encoding watermark numbers as cographs using self-inverting permutations
Abstract. In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. ...
Maria Chroni, Stavros D. Nikolopoulos
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain