Sciweavers

5123 search results - page 115 / 1025
» Performance and Security Tradeoff
Sort
View
ACL
2008
15 years 6 months ago
Soft Syntactic Constraints for Hierarchical Phrased-Based Translation
In adding syntax to statistical MT, there is a tradeoff between taking advantage of linguistic analysis, versus allowing the model to exploit linguistically unmotivated mappings l...
Yuval Marton, Philip Resnik
CORR
2006
Springer
94views Education» more  CORR 2006»
15 years 4 months ago
Cooperative Lattice Coding and Decoding
We propose novel lattice coding/decoding schemes for half-duplex outage-limited cooperative channels. These schemes are inspired by the cooperation protocols of Azarian et al. and ...
Arul D. Murugan, Kambiz Azarian, Hesham El Gamal
142
Voted
WISTP
2010
Springer
15 years 11 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
WISEC
2010
ACM
15 years 9 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
ICDCS
2007
IEEE
15 years 11 months ago
Overlay Node Placement: Analysis, Algorithms and Impact on Applications
Abstract— Overlay routing has emerged as a promising approach to improving performance and reliability of Internet paths. To fully realize the potential of overlay routing under ...
Sabyasachi Roy, Himabindu Pucha, Zheng Zhang, Y. C...