Sciweavers

813 search results - page 143 / 163
» Pipeline-centric provenance model
Sort
View
VTC
2008
IEEE
138views Communications» more  VTC 2008»
14 years 2 months ago
Mobile IP as an Enabling Technology for VoIP in Metropolitan Wireless Mesh Networks
—Metropolitan wireless mesh networks are being deployed to provide broadband connectivity to city-wide hotspots. However, its commercial feasibility and business model have not y...
Andres Arjona, Antti Ylä-Jääski
ISBRA
2007
Springer
14 years 1 months ago
Reconstruction of 3D Structures from Protein Contact Maps
Proteins are large organic compounds made of amino acids arranged in a linear chain (primary structure). Most proteins fold into unique threedimensional (3D) structures called inte...
Marco Vassura, Luciano Margara, Filippo Medri, Pie...
ICRA
2005
IEEE
122views Robotics» more  ICRA 2005»
14 years 1 months ago
Robust Adaptive Control of Automatic Guidance of Farm Vehicles in the Presence of Sliding
— High-precision autofarming is rapidly becoming a reality with the requirements of agricultural applications. Lots of research works have been focused on the automatic guidance ...
Hao Fang, Roland Lenain, Benoit Thuilot, Philippe ...
SPAA
2005
ACM
14 years 1 months ago
Dynamic page migration with stochastic requests
The page migration problem is one of subproblems of data management in networks. It occurs in a distributed network of processors sharing one indivisible memory page of size D. Du...
Marcin Bienkowski
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr