Sciweavers

2714 search results - page 284 / 543
» Approximation Schemes for Scheduling
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
LREC
2010
163views Education» more  LREC 2010»
15 years 5 months ago
Towards Building Annotated Resources for Analyzing Opinions and Argumentation in News Editorials
This paper describes an annotation scheme for argumentation in opinionated texts such as newspaper editorials, elaborated from a corpus of approximately 500 English texts from Nep...
Bal Krishna Bal, Patrick Saint-Dizier
BC
1999
108views more  BC 1999»
15 years 3 months ago
Exact digital simulation of time-invariant linear systems with applications to neuronal modeling
An ecient new method for the exact digital simulation of time-invariant linear systems is presented. Such systems are frequently encountered as models for neuronal systems, or as s...
Stefan Rotter, Markus Diesmann
164
Voted
INFOCOM
1999
IEEE
15 years 8 months ago
Scalable Flow Control for Multicast ABR Services
We propose a flow-control scheme for multicast ABR services in ATM networks. At the heart of the proposed scheme is an optimal secondorder rate control algorithm, called the -contr...
Xi Zhang, Kang G. Shin, Debanjan Saha, Dilip D. Ka...
EUROCRYPT
2012
Springer
13 years 6 months ago
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan’s (DGHV) fully homomorphic scheme over the integers from ËœO(Î...
Jean-Sébastien Coron, David Naccache, Mehdi...