Sciweavers

3353 search results - page 517 / 671
» Laver and set theory
Sort
View
93
Voted
MOBICOM
2004
ACM
15 years 3 months ago
Initializing newly deployed ad hoc and sensor networks
A newly deployed multi-hop radio network is unstructured and lacks a reliable and efficient communication scheme. In this paper, we take a step towards analyzing the problems exis...
Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer
PDC
2004
ACM
15 years 3 months ago
The impact of participation in information system design: a comparison of contextual placements
To compare the outcomes of participatory and user-centered contextual design, case study methods and the Activity Checklist derived from Activity Theory are used to analyze two sy...
Magnus Irestig, Henrik Eriksson, Toomas Timpka
76
Voted
SIGIR
2004
ACM
15 years 3 months ago
Document clustering via adaptive subspace iteration
Document clustering has long been an important problem in information retrieval. In this paper, we present a new clustering algorithm ASI1, which uses explicitly modeling of the s...
Tao Li, Sheng Ma, Mitsunori Ogihara
78
Voted
ASIACRYPT
2004
Springer
15 years 3 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
ATAL
2004
Springer
15 years 3 months ago
Universality in Multi-Agent Systems
Much research in multi-agent systems reflects the field’s origins in classical artificial intelligence, showing how various refinements to the internal reasoning of individual a...
H. Van Dyke Parunak, Sven Brueckner, Robert Savit