Sciweavers

2421 search results - page 317 / 485
» Message from the Editor-in-Chief
Sort
View
80
Voted
INFOCOM
2007
IEEE
15 years 4 months ago
A Constant Approximation Algorithm for Interference Aware Broadcast in Wireless Networks
— Broadcast protocols play a vital role in multihop wireless networks. Due to the broadcast nature of radio signals, a node’s interference range can be larger than its transmis...
Zhenming Chen, Chunming Qiao, Jinhui Xu, Taekkyeun...
LCN
2007
IEEE
15 years 4 months ago
Search Algorithms for Unstructured Peer-to-Peer Networks
Abstract—We study the performance of several search algorithms on unstructured peer-to-peer networks, both using classic search algorithms such as flooding and random walk, as w...
Reza Dorrigiv, Alejandro López-Ortiz, Pawel...
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
15 years 4 months ago
Generic Transformation to Strongly Unforgeable Signatures
Recently, there are several generic transformation techniques proposed for converting unforgeable signature schemes (the message in the forgery has not been signed yet) into strong...
Qiong Huang, Duncan S. Wong, Yiming Zhao
CICLING
2007
Springer
15 years 4 months ago
Dependency Analysis and CBR to Bridge the Generation Gap in Template-Based NLG
The present paper describes how dependency analysis can be used to automatically extract from a corpus a set of cases - and an accompanying vocabulary - which enable a template-bas...
Virginia Francisco, Raquel Hervás, Pablo Ge...
TGC
2007
Springer
15 years 4 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou