Sciweavers

24451 search results - page 4888 / 4891
» Research methods in information
Sort
View
EMSOFT
2011
Springer
12 years 9 months ago
From boolean to quantitative synthesis
Motivated by improvements in constraint-solving technology and by the increase of routinely available computational power, partial-program synthesis is emerging as an effective a...
Pavol Cerný, Thomas A. Henzinger
IACR
2011
89views more  IACR 2011»
12 years 9 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
ICC
2011
IEEE
239views Communications» more  ICC 2011»
12 years 9 months ago
The Insights of DV-Based Localization Algorithms in the Wireless Sensor Networks with Duty-Cycled and Radio Irregular Sensors
—Location information of nodes is the basis for many applications in wireless sensor networks (WSNs). However, most previous localization methods make the unrealistic assumption:...
Yuanfang Chen, Lei Shu, Mingchu Li, Ziqi Fan, Lei ...
INFOCOM
2012
IEEE
12 years 1 days ago
Network optimization for DHT-based applications
—P2P platforms have been criticized because of the heavy strain that some P2P services can inflict on costly interdomain links of network operators. It is therefore necessary to...
Yi Sun, Yang Richard Yang, Xiaobing Zhang, Yang Gu...
TOG
2012
209views Communications» more  TOG 2012»
12 years 1 days ago
Animating bubble interactions in a liquid foam
Bubbles and foams are important features of liquid surface phenomena, but they are difficult to animate due to their thin films and complex interactions in the real world. In par...
Oleksiy Busaryev, Tamal K. Dey, Huamin Wang, Zhong...
« Prev « First page 4888 / 4891 Last » Next »