Sciweavers

5263 search results - page 982 / 1053
» Open Constraint Optimization
Sort
View
CRYPTO
2006
Springer
111views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
We address the message authentication problem in two seemingly different communication models. In the first model, the sender and receiver are connected by an insecure channel and...
Moni Naor, Gil Segev, Adam Smith
CIKM
2009
Springer
15 years 6 months ago
Provenance query evaluation: what's so special about it?
While provenance has been extensively studied in the literature, the efficient evaluation of provenance queries remains an open problem. Traditional query optimization techniques...
Anastasios Kementsietsidis, Min Wang
172
Voted
BROADNETS
2006
IEEE
15 years 5 months ago
On the Broadcast Storm Problem in Ad hoc Wireless Networks
Routing protocols developed for ad hoc wireless networks use broadcast transmission to either discover a route or disseminate information. More specifically, reactive routing proto...
Ozan K. Tonguz, Nawaporn Wisitpongphan, Jayendra S...
129
Voted
COMPGEOM
2008
ACM
15 years 5 months ago
Discrete laplace operator on meshed surfaces
In recent years a considerable amount of work in graphics and geometric optimization used tools based on the Laplace-Beltrami operator on a surface. The applications of the Laplac...
Mikhail Belkin, Jian Sun, Yusu Wang
110
Voted
CONEXT
2008
ACM
15 years 5 months ago
Online estimation of RF interference
Increased AP density in enterprise WLANs leads to increasing RF interference and decreasing performance. An important step towards mitigating this problem is to construct precise ...
Nabeel Ahmed, Usman Ismail, Srinivasan Keshav, Kon...