Sciweavers

6251 search results - page 1062 / 1251
» Randomness, Computability, and Density
Sort
View
WIOPT
2005
IEEE
15 years 10 months ago
Optimal Controlled Flooding Search in a Large Wireless Network
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large wireless network. We consider the class of controlled flo...
Nicholas B. Chang, Mingyan Liu
WOWMOM
2005
ACM
165views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks
Recent work on key establishment for sensor networks has shown that it is feasible to employ limited Elliptic Curve Cryptography in sensor networks through hybrid protocols. In th...
Panayiotis Kotzanikolaou, Emmanouil Magkos, Christ...
ADHOCNOW
2005
Springer
15 years 10 months ago
Performance Analysis of the Hierarchical Layer Graph for Wireless Networks
The Hierarchical Layer Graph (HL graph) is a promising network topology for wireless networks with variable transmission ranges. It was introduced and analyzed by Meyer auf der He...
Stefan Rührup, Christian Schindelhauer, Klaus...
AIED
2005
Springer
15 years 10 months ago
Advanced Geometry Tutor: An intelligent tutor that teaches proof-writing with construction
: Two problem solving strategies, forward chaining and backward chaining, were compared to see how they affect students’ learning of geometry theorem proving with construction. I...
Noboru Matsuda, Kurt VanLehn
CCS
2005
ACM
15 years 10 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
« Prev « First page 1062 / 1251 Last » Next »