Sciweavers

11381 search results - page 2049 / 2277
» Connectivity
Sort
View
ROBOCUP
2005
Springer
123views Robotics» more  ROBOCUP 2005»
15 years 10 months ago
Mobile Robot Communication Without the Drawbacks of Wireless Networking
Abstract. The default solution for mobile robot communication is RFnetworking, typically based on one of the IEEE 802.11 standards also known as WLAN technology. Radio communicatio...
Andreas Birk 0002, Cosmin Condea
SSS
2005
Springer
132views Control Systems» more  SSS 2005»
15 years 10 months ago
Self-stabilizing Mobile Node Location Management and Message Routing
We present simple algorithms for achieving self-stabilizing location management and routing in mobile ad-hoc networks. While mobile clients may be susceptible to corruption and sto...
Shlomi Dolev, Limor Lahiani, Nancy A. Lynch, Tina ...
TBILLC
2005
Springer
15 years 10 months ago
Case Attraction in Ancient Greek
Case attraction has stood as a puzzling, and elusive, oddity of older Indo-European languages. This paper focuses on attraction in Ancient Greek, establishing both the regularity o...
Scott Grimm
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
15 years 10 months ago
Characterizing Ideal Weighted Threshold Secret Sharing
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In such settings, there is a set of users where each user is assigned a positive w...
Amos Beimel, Tamir Tassa, Enav Weinreb
139
Voted
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
15 years 10 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
« Prev « First page 2049 / 2277 Last » Next »