Sciweavers

1693 search results - page 52 / 339
» Interference-Resilient Information Exchange
Sort
View
JSAC
2007
79views more  JSAC 2007»
14 years 9 months ago
Collaborative decoding in bandwidth-constrained environments
We present a cooperative communication scheme in which a group of receivers can collaborate to decode a message that none of the receivers can individually decode. The receivers a...
Arun Nayagam, John M. Shea, Tan F. Wong
CEAS
2006
Springer
15 years 1 months ago
Email Thread Reassembly Using Similarity Matching
Email thread reassembly is the task of linking messages by parentchild relationships. In this paper, we present two approaches to address this problem. One exploits previously und...
Jen-Yuan Yeh
INTERACT
2003
14 years 11 months ago
Messaging And Formality: Will IM Follow in the Footsteps of Email?
: One virtue of instant messaging is informality. As messaging is used more in work settings, being able to consult an exchange later can be beneficial. However, archived communica...
Tracey Lovejoy, Jonathan Grudin
SIGIR
2008
ACM
14 years 9 months ago
Workshop on aggregated search
The Workshop on Aggregated seeks to define the research problems for aggregated search results, and to build a community of researchers working in this emerging area. Aggregated s...
Vanessa Murdock, Mounia Lalmas
RAID
1999
Springer
15 years 2 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier