Sciweavers

6431 search results - page 977 / 1287
» Model Building by Resolution
Sort
View
WOWMOM
2005
ACM
90views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
Saturation Throughput Analysis of a System of Interfering IEEE 802.11 WLANs
IEEE 802.11 wireless local area networks that span large buildings or campuses must comprise multiple cells, several of which must necessarily be cochannel cells. It can be shown ...
Manoj K. Panda, Anurag Kumar, S. H. Srinivasan
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
15 years 10 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...
ATAL
2005
Springer
15 years 10 months ago
Formalizing and achieving multiparty agreements via commitments
Multiparty agreements often arise in a multiagent system where autonomous agents interact with each other to achieve a global goal. Multiparty agreements are traditionally represe...
Feng Wan, Munindar P. Singh
BIRTHDAY
2005
Springer
15 years 10 months ago
Expander2
Expander2 is a flexible multi-purpose workbench for interactive rewriting, verification, constraint solving, flow graph analysis and other procedures that build up proofs or co...
Peter Padawitz
CONTEXT
2005
Springer
15 years 10 months ago
Design of context-aware systems for vehicles using complex system paradigms
Abstract. This paper argues that the driving task exhibits the properties of complex systems. Driving behavior emerges from the intricate and complex interactions between the drive...
Andry Rakotonirainy