Sciweavers

SIGMETRICS
2010
ACM
214views Hardware» more  SIGMETRICS 2010»
13 years 9 months ago
Distributed sensor network localization from local connectivity: performance analysis for the HOP-TERRAIN algorithm
This paper addresses the problem of determining the node locations in ad-hoc sensor networks when only connectivity information is available. In previous work, we showed that the ...
Amin Karbasi, Sewoong Oh
ICALP
2003
Springer
13 years 9 months ago
A Direct Sum Theorem in Communication Complexity via Message Compression
We prove lower bounds for the direct sum problem for two-party bounded error randomised multipleround communication protocols. Our proofs use the notion of information cost of a p...
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen
INFOCOM
2003
IEEE
13 years 9 months ago
Minimum Power Broadcast Trees for Wireless Networks: Integer Programming Formulations
— Wireless multicast/broadcast sessions, unlike wired networks, inherently reaches several nodes with a single transmission. For omnidirectional wireless broadcast to a node, all...
Arindam Kumar Das
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
13 years 10 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
ITS
2004
Springer
99views Multimedia» more  ITS 2004»
13 years 10 months ago
Promoting Effective Help-Seeking Behavior Through Declarative Instruction
The ability to use help-resources efficiently is an important skill in any learning environment, whether the student is in a traditional classroom or is using an Intelligent Tutor...
Ido Roll, Vincent Aleven, Kenneth R. Koedinger
LPAR
2005
Springer
13 years 10 months ago
Concepts of Automata Construction from LTL
We present an algorithm for the conversion of very weak alternating Büchi automata into nondeterministic Büchi automata (NBA), and we introduce a local optimization criterion fo...
Carsten Fritz
ICCSA
2005
Springer
13 years 10 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
GFKL
2005
Springer
97views Data Mining» more  GFKL 2005»
13 years 10 months ago
Parameter Optimization in Automatic Transcription of Music
Based on former work on automatic transcription of musical time series into sheet music (Ligges et al. (2002), Weihs and Ligges (2003, 2005)) in this paper parameters of the transc...
Claus Weihs, Uwe Ligges
SIGECOM
2006
ACM
106views ECommerce» more  SIGECOM 2006»
13 years 10 months ago
Approximation algorithms and online mechanisms for item pricing
We present approximation and online algorithms for a number of problems of pricing items for sale so as to maximize seller’s revenue in an unlimited supply setting. Our first r...
Maria-Florina Balcan, Avrim Blum
GLOBECOM
2006
IEEE
13 years 10 months ago
On Decoding, Mutual Information, and Antenna Selection Diversity for Quasi-Orthogonal STBC with Minimum Decoding Complexity
Abstract— ABBA codes are an important class of quasiorthogonal space-time block codes proposed by Tirkkonen et al.. Recently, they have become more attractive for practical appli...
Dung Ngoc Dao, Chintha Tellambura