Sciweavers

1203 search results - page 128 / 241
» A Reference Model for a Networked Organization
Sort
View
NAS
2010
IEEE
14 years 11 months ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu
STOC
2002
ACM
152views Algorithms» more  STOC 2002»
16 years 1 months ago
Universally composable two-party and multi-party secure computation
d Abstract) Ran Canetti Yehuda Lindell Rafail Ostrovsky Amit Sahai? We show how to securely realize any multi-party functionality in a universally composable way, regardless of th...
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Ami...
108
Voted
AINA
2007
IEEE
15 years 7 months ago
Using Web Directories for Similarity Measurement in Personal Name Disambiguation
In this paper, we target on the problem of personal name disambiguation in search results returned by personal name queries. Usually, a personal name refers to several people. The...
Quang Minh Vu, Tomonari Masada, Atsuhiro Takasu, J...
105
Voted
MDM
2010
Springer
209views Communications» more  MDM 2010»
15 years 5 months ago
An Interactive-Voting Based Map Matching Algorithm
—Matching a raw GPS trajectory to roads on a digital map is often referred to as the Map Matching problem. However, the occurrence of the low-sampling-rate trajectories (e.g. one...
Jing Yuan, Yu Zheng, Chengyang Zhang, Xing Xie, Gu...
101
Voted
ICNP
2005
IEEE
15 years 6 months ago
CONNET: Self-Controlled Access Links for Delay and Jitter Requirements
Access links are typically the bottleneck between a high bandwidth LAN and a high bandwidth IP network. Without a priori resource provisioning or reservation, this tends to have a...
Mohamed A. El-Gendy, Kang G. Shin, Hosam Fathy