Sciweavers

5344 search results - page 1044 / 1069
» Privacy-Preserving Set Operations
Sort
View
ISCI
2007
108views more  ISCI 2007»
13 years 9 months ago
A degree-constrained QoS-aware routing algorithm for application layer multicast
Application layer multicast (ALM) provides a low-cost solution for multicast over the Internet. It overcomes the deployment hurdle of IP multicast by moving all multicast related ...
Baoliu Ye, Minyi Guo, Daoxu Chen, Sanglu Lu
TIP
2008
153views more  TIP 2008»
13 years 9 months ago
Generalized Flooding and Multicue PDE-Based Image Segmentation
Image segmentation remains an important, but hard-to-solve, problem since it appears to be application dependent with usually no a priori information available regarding the image ...
Anastasia Sofou, Petros Maragos
TISSEC
2008
235views more  TISSEC 2008»
13 years 9 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
JACM
2007
84views more  JACM 2007»
13 years 9 months ago
Polymorphic higher-order recursive path orderings
This paper extends the termination proof techniques based on reduction orderings to a higher-order setting, by defining a family of recursive path orderings for terms of a typed ...
Jean-Pierre Jouannaud, Albert Rubio
JAIR
2007
118views more  JAIR 2007»
13 years 9 months ago
Individual and Domain Adaptation in Sentence Planning for Dialogue
One of the biggest challenges in the development and deployment of spoken dialogue systems is the design of the spoken language generation module. This challenge arises from the n...
Marilyn A. Walker, Amanda Stent, François M...
« Prev « First page 1044 / 1069 Last » Next »