Sciweavers

840 search results - page 118 / 168
» XML: From Practice to Theory
Sort
View
CCS
2003
ACM
14 years 29 days ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
EWSN
2010
Springer
14 years 25 days ago
Wiselib: A Generic Algorithm Library for Heterogeneous Sensor Networks
One unfortunate consequence of the success story of wireless sensor networks (WSNs) in separate research communities is an evergrowing gap between theory and practice. Even though ...
Tobias Baumgartner, Ioannis Chatzigiannakis, S&aac...
CASC
2006
Springer
128views Mathematics» more  CASC 2006»
13 years 11 months ago
New Domains for Applied Quantifier Elimination
We address various aspects of our computer algebra-based computer logic system redlog. There are numerous examples in the literature for successful applications of redlog to practi...
Thomas Sturm
TSP
2010
13 years 2 months ago
Communications-inspired sensing: a case study on waveform design
Information theory, and particularly the mutual information (MI), has provided fundamental guidance for communications research. In Bell's 1993 paper, the MI was first applied...
Wenshu Zhang, Liuqing Yang
P2P
2007
IEEE
161views Communications» more  P2P 2007»
14 years 1 months ago
The BitCod Client: A BitTorrent Clone using Network Coding
Network coding is an emerging field of research with sound and mature theory supporting it. Recent works shows that it has many benefits like improved fault tolerance, higher ...
Danny Bickson, Roy Borer