Sciweavers

644 search results - page 91 / 129
» A topological characterization of weakness
Sort
View
AIRWEB
2007
Springer
15 years 6 months ago
Using Spam Farm to Boost PageRank
Nowadays web spamming has emerged to take the economic advantage of high search rankings and threatened the accuracy and fairness of those rankings. Understanding spamming techniq...
Ye Du, Yaoyun Shi, Xin Zhao
PAM
2007
Springer
15 years 6 months ago
Routing Stability in Static Wireless Mesh Networks
Considerable research has focused on the design of routing protocols for wireless mesh networks. Yet, little is understood about the stability of routes in such networks. This unde...
Krishna N. Ramachandran, Irfan Sheriff, Elizabeth ...
UCS
2007
Springer
15 years 6 months ago
Detection of User Mode Shift in Home
A ubiquitous environment enable us to enjoy various services “anytime” ”anywhere”. However, “everyone” is not realized. We research an intelligent space “everyone” ...
Hiroyuki Yamahara, Hideyuki Takada, Hiromitsu Shim...
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness
Unconditionally secure multi-party computations in general, and broadcast in particular, are impossible if any third of the players can be actively corrupted and if no additional i...
Matthias Fitzi, Stefan Wolf, Jürg Wullschlege...
DEON
2004
Springer
15 years 5 months ago
Designing a Deontic Logic of Deadlines
This paper studies the logic of a dyadic modal operator for being obliged to meet a condition ρ before a condition δ becomes true. Starting from basic intuitions we arrive at a s...
Jan Broersen, Frank Dignum, Virginia Dignum, John-...