Sciweavers

193 search results - page 25 / 39
» Short Bases of Lattices over Number Fields
Sort
View
TMC
2012
11 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
ICDE
2011
IEEE
225views Database» more  ICDE 2011»
13 years 4 days ago
Methods for boosting recommender systems
—Online shopping has grown rapidly over the past few years. Besides the convenience of shopping directly from ones home, an important advantage of e-commerce is the great variety...
Rubi Boim, Tova Milo
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 5 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
ACL
2010
13 years 6 months ago
Hierarchical Sequential Learning for Extracting Opinions and Their Attributes
Automatic opinion recognition involves a number of related tasks, such as identifying the boundaries of opinion expression, determining their polarity, and determining their inten...
Yejin Choi, Claire Cardie
CORR
2010
Springer
105views Education» more  CORR 2010»
13 years 3 months ago
Universal and Robust Distributed Network Codes
Random linear network codes can be designed and implemented in a distributed manner, with low computational complexity. However, these codes are classically implemented [1] over fi...
Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lin...