Sciweavers

1179 search results - page 21 / 236
» Should Superclasses be Abstract
Sort
View
123
Voted
PERCOM
2005
ACM
16 years 2 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
97
Voted
GD
2000
Springer
15 years 6 months ago
Fast Layout Methods for Timetable Graphs
Abstract. Timetable graphs are used to analyze transportation networks. In their visualization, vertex coordinates are fixed to preserve the underlying geography, but due to small ...
Ulrik Brandes, Galina Shubina, Roberto Tamassia, D...
107
Voted
ANTS
2006
Springer
75views Algorithms» more  ANTS 2006»
15 years 4 months ago
Symmetric Powers of Elliptic Curve L-Functions
Abstract. The conjectures of Deligne, Beilinson, and Bloch-Kato assert that there should be relations between the arithmetic of algebrogeometric objects and the special values of t...
Phil Martin, Mark Watkins
114
Voted
AAAI
1998
15 years 4 months ago
Machine Learning of Generic and User-Focused Summarization
A key problem in text summarization is finding a salience function which determines what information in the source should be included in the summary. This paper describes the use ...
Inderjeet Mani, Eric Bloedorn
102
Voted
JOT
2007
99views more  JOT 2007»
15 years 2 months ago
On the Footprints of Join Points: The Blueprint Approach
nt selection mechanism at a high-level of abstraction to decouple aspects from the application code. To this regard, we adopt a high-level pattern-based join point model, where joi...
Walter Cazzola, Sonia Pini