Sciweavers

413 search results - page 51 / 83
» Abstract Argumentation Scheme Frameworks
Sort
View
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
15 years 3 months ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
JSAC
2007
102views more  JSAC 2007»
15 years 1 months ago
A Robust Coded MIMO FH-CDMA Transceiver for Mobile Ad Hoc Networks
Abstract— In this paper, we develop a coded MIMO FHCDMA transceiver that is robust to partial-band jamming and the near-far problem for ad hoc networks with high mobility. Spatia...
Haichang Sui, James R. Zeidler
PPSN
2010
Springer
15 years 9 days ago
Threshold Selection, Mitosis and Dual Mutation in Cooperative Co-evolution: Application to Medical 3D Tomography
Abstract. We present and analyse the behaviour of specialised operators designed for cooperative coevolution strategy in the framework of 3D tomographic PET reconstruction. The bas...
Franck Patrick Vidal, Evelyne Lutton, Jean Louchet...
TON
2008
109views more  TON 2008»
15 years 1 months ago
Efficient routing in intermittently connected mobile networks: the single-copy case
Abstract--Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are m...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
141
Voted
TON
2008
107views more  TON 2008»
15 years 1 months ago
Efficient routing in intermittently connected mobile networks: the multiple-copy case
Abstract--Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are m...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...