Sciweavers

1150 search results - page 166 / 230
» Note from the Editor
Sort
View
CCECE
2009
IEEE
13 years 11 months ago
Prohibitive-link Detection and Routing Protocol
In this paper we investigate the limits of routing according to left- or righthand rule (LHR). Using LHR, a node upon receipt of a message will forward to the neighbour that sits ...
Marwan Fayed, Hussein T. Mouftah
GREC
2009
Springer
13 years 11 months ago
Interactive Conversion of Web Tables
Two hundred web tables from ten sites were imported into Excel. The tables were edited as needed, then converted into layout independent Wang using the Table Abstraction Tool (TAT)...
Raghav Krishna Padmanabhan, Ramana Chakradhar Jand...
AAAI
2008
13 years 10 months ago
Parallel Belief Revision
A recalcitrant problem in approaches to iterated belief revision is that, after first revising by a formula and then by a formula that is inconsistent with the first formula, all ...
James P. Delgrande, Yi Jin
ALGOSENSORS
2008
Springer
13 years 9 months ago
Probabilistic Protocols for Fair Communication in Wireless Sensor Networks
In this work we present three new distributed, probabilistic data propagation protocols for Wireless Sensor Networks which aim at maximizing the network's operational life and...
Ioannis Chatzigiannakis, Lefteris M. Kirousis, Tho...
ASIACRYPT
2008
Springer
13 years 9 months ago
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computa...
Goichiro Hanaoka, Kaoru Kurosawa