Sciweavers

1777 search results - page 257 / 356
» Programming Cryptographic Protocols
Sort
View
ICALP
2011
Springer
13 years 8 days ago
New Algorithms for Learning in Presence of Errors
We give new algorithms for a variety of randomly-generated instances of computational problems using a linearization technique that reduces to solving a system of linear equations...
Sanjeev Arora, Rong Ge
EMSOFT
2009
Springer
14 years 3 months ago
Compositional deadlock detection for rendezvous communication
Concurrent programming languages are growing in importance with the advent of multi-core systems. However, concurrent programs suffer from problems, such as data races and deadloc...
Baolin Shao, Nalini Vasudevan, Stephen A. Edwards
MOBISYS
2005
ACM
14 years 8 months ago
MediaAlert: a broadcast video monitoring and alerting system for mobile users
? We present a system for automatic monitoring and timely dissemination of multimedia information to a range of mobile information appliances based on each user's interest pro...
Bin Wei, Bernard Renger, Yih-Farn Chen, Rittwik Ja...
IFIP
2009
Springer
14 years 3 months ago
On Designing for Tussle: Future Internet in Retrospect
Abstract. Over the past decades, the fundamental principles of the Internet architecture have not significantly changed. However, Internet evolution and its effects on participants...
Costas Kalogiros, Alexandros Kostopoulos, Alan For...
GLOBECOM
2008
IEEE
14 years 3 months ago
One- and Two-Way Decode-and-Forward Relaying for Wireless Multiuser MIMO Networks
— In this paper, we propose multiuser multiple-input multiple-ouput (MIMO) one- and two-way relaying protocols. Several wireless MIMO node pairs are establishing either unidirect...
Celal Esli, Armin Wittneben