Sciweavers

1179 search results - page 21 / 236
» Should Superclasses be Abstract
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
GD
2000
Springer
13 years 11 months ago
Fast Layout Methods for Timetable Graphs
Abstract. Timetable graphs are used to analyze transportation networks. In their visualization, vertex coordinates are fixed to preserve the underlying geography, but due to small ...
Ulrik Brandes, Galina Shubina, Roberto Tamassia, D...
ANTS
2006
Springer
75views Algorithms» more  ANTS 2006»
13 years 9 months ago
Symmetric Powers of Elliptic Curve L-Functions
Abstract. The conjectures of Deligne, Beilinson, and Bloch-Kato assert that there should be relations between the arithmetic of algebrogeometric objects and the special values of t...
Phil Martin, Mark Watkins
AAAI
1998
13 years 9 months ago
Machine Learning of Generic and User-Focused Summarization
A key problem in text summarization is finding a salience function which determines what information in the source should be included in the summary. This paper describes the use ...
Inderjeet Mani, Eric Bloedorn
JOT
2007
99views more  JOT 2007»
13 years 7 months ago
On the Footprints of Join Points: The Blueprint Approach
nt selection mechanism at a high-level of abstraction to decouple aspects from the application code. To this regard, we adopt a high-level pattern-based join point model, where joi...
Walter Cazzola, Sonia Pini