Sciweavers

11580 search results - page 2181 / 2316
» Communication vs. Computation
Sort
View
AGP
2010
IEEE
15 years 1 months ago
Agents, Multi-Agent Systems and Declarative Programming: What, When, Where, Why, Who, How?
This chapter tackles the relation between declarative languages and multi-agent systems by following the dictates of the five Ws (and one H) that characterize investigations. The ...
Matteo Baldoni, Cristina Baroglio, Viviana Mascard...
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 1 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
MOBISYS
2010
ACM
15 years 12 days ago
Anatomizing application performance differences on smartphones
The use of cellular data networks is increasingly popular due to the widespread deployment of 3G technologies and the rapid adoption of smartphones, such as iPhone and GPhone. Bes...
Junxian Huang, Qiang Xu, Birjodh Tiwana, Zhuoqing ...
MOBISYS
2010
ACM
15 years 12 days ago
Energy-efficient rate-adaptive GPS-based positioning for smartphones
Many emerging smartphone applications require position information to provide location-based or context-aware services. In these applications, GPS is often preferred over its alte...
Jeongyeup Paek, Joongheon Kim, Ramesh Govindan
NSDI
2007
15 years 12 days ago
Ricochet: Lateral Error Correction for Time-Critical Multicast
Ricochet is a low-latency reliable multicast protocol designed for time-critical clustered applications. It uses IP Multicast to transmit data and recovers from packet loss in end...
Mahesh Balakrishnan, Kenneth P. Birman, Amar Phani...
« Prev « First page 2181 / 2316 Last » Next »