Sciweavers

1690 search results - page 224 / 338
» Algorithmic Properties of Millstream Systems
Sort
View
POPL
2005
ACM
16 years 4 months ago
Synthesis of interface specifications for Java classes
While a typical software component has a clearly specified (static) interface in terms of the methods and the input/output types they support, information about the correct sequen...
P. Madhusudan, Pavol Cerný, Rajeev Alur, Wo...
MOBIHOC
2006
ACM
16 years 3 months ago
Message ferry route design for sparse ad hoc networks with mobile nodes
Message ferrying is a networking paradigm where a special node, called a message ferry, facilitates the connectivity in a mobile ad hoc network where the nodes are sparsely deploy...
Muhammad Mukarram Bin Tariq, Mostafa H. Ammar, Ell...
IWCMC
2009
ACM
15 years 8 months ago
Graph coloring based physical-cell-ID assignment for LTE networks
Autoconfiguration of the radio parameters is a key feature for next generation mobile networks. Especially for LTE the NGMN Forum has brought it up as a major requirement. It is ...
Tobias Bandh, Georg Carle, Henning Sanneck
125
Voted
TMI
2002
96views more  TMI 2002»
15 years 3 months ago
Imaging of spatiotemporal coincident states by DC optical tomography
The utility of optical tomography as a practical imaging modality has, thus far, been limited by its intrinsically low spatial resolution and quantitative accuracy. Recently, we ha...
Harry L. Graber, Yaling Pei, Randall L. Barbour
163
Voted
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters