Sciweavers

1485 search results - page 224 / 297
» connection 2010
Sort
View
117
Voted
RAID
2010
Springer
15 years 1 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
110
Voted
RSA
2010
91views more  RSA 2010»
15 years 1 months ago
The second largest component in the supercritical 2D Hamming graph
The 2-dimensional Hamming graph H(2, n) consists of the n2 vertices (i, j), 1 ≤ i, j ≤ n, two vertices being adjacent when they share a common coordinate. We examine random sub...
Remco van der Hofstad, Malwina J. Luczak, Joel Spe...
158
Voted
RULEML
2010
Springer
15 years 1 months ago
Photorealistic Semantic Web Service Groundings: Unifying RESTful and XML-RPC Groundings Using Rules, with an Application to Flic
Semantic Web services achieve effects in the world through Web services, so the mechanism connecting the ontological representations of services with the on-the-wire messages—th...
Dave Lambert, John Domingue
SCN
2010
Springer
142views Communications» more  SCN 2010»
15 years 1 months ago
How to Pair with a Human
We introduce a protocol, that we call Human Key Agreement, that allows pairs of humans to establish a key in a (seemingly hopeless) case where no public-key infrastructure is avail...
Stefan Dziembowski
147
Voted
SIAMDM
2010
140views more  SIAMDM 2010»
15 years 1 months ago
Retractions to Pseudoforests
For a fixed graph H, let Ret(H) denote the problem of deciding whether a given input graph is retractable to H. We classify the complexity of Ret(H) when H is a graph (with loops ...
Tomás Feder, Pavol Hell, Peter Jonsson, And...