Sciweavers

488 search results - page 62 / 98
» Simulating Context Effects in Problem Solving with AMBR
Sort
View
IJISEC
2007
61views more  IJISEC 2007»
13 years 8 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
TNN
1998
125views more  TNN 1998»
13 years 8 months ago
Symbolic connectionism in natural language disambiguation
Abstract—Natural language understanding involves the simultaneous consideration of a large number of different sources of information. Traditional methods employed in language an...
Samuel W. K. Chan, James Franklin
ICDCS
2007
IEEE
14 years 3 months ago
Temporal Privacy in Wireless Sensor Networks
Although the content of sensor messages describing “events of interest” may be encrypted to provide confidentiality, the context surrounding these events may also be sensitiv...
Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong ...
SIGCOMM
1999
ACM
14 years 1 months ago
Quality Adaptation for Congestion Controlled Video Playback over the Internet
Streaming audio and video applications are becoming increasingly popular on the Internet, and the lack of effective congestion control in such applications is now a cause for sign...
Reza Rejaie, Mark Handley, Deborah Estrin
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 3 months ago
Joint Power and Constellation Size Adaptation for Mobile Multicast Employing MQAM Over Wireless Fading Channels
Abstract— We propose a power and constellation-size adaptation scheme for the multicast system employing multilevel quadrature amplitude modulation (MQAM) with discrete constella...
Qinghe Du, Xi Zhang