Sciweavers

265 search results - page 16 / 53
» et 2000
Sort
View
MOBILIGHT
2010
13 years 5 months ago
Robust Wireless Network Coding - An Overview
Network Coding (NC) has witnessed a tremendous upsurge in interest and activities in recent years, both in academia and industry. Indeed, since the pioneering publication of Ahlswe...
Marco Di Renzo, Lana Iwaza, Michel Kieffer, Pierre...
WER
2000
Springer
13 years 11 months ago
O Uso do Framework NFR no Projeto de Banco de Dados
Distributed database design is a complex process that involves a set of distinct aspects for the accomplishment of an adequate data distribution (Buretta 1997). Many of these aspec...
Márcia Santos, Maria Lencastre, Jaelson Bre...
CRYPTO
2005
Springer
83views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
A Practical Attack on a Braid Group Based Cryptographic Protocol
In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehorn...
Alexei G. Myasnikov, Vladimir Shpilrain, Alexander...
COLING
2000
13 years 9 months ago
A Statistical Theory of Dependency Syntax
A generative statistical model of dependency syntax is proposed based on 'l'csniSre's classical theory. It provides a stochastic formalization of the original model...
Christer Samuelsson
ECIS
2001
13 years 9 months ago
An Interactive Telecommunications Degree with Vision for the Future
This paper presents a new curriculum for the Internet and e-business that has been developed at University of Redlands in Southern California with first offering in 2000. The pape...
James B. Pick, Sunny J. Baker