Sciweavers

344 search results - page 26 / 69
» Optimization problems from feature testing of communication ...
Sort
View
SIGCOMM
1996
ACM
15 years 6 months ago
Internet Mobility 4x4
Mobile IP protocols allow mobile hosts to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment ...
Stuart Cheshire, Mary Baker
INFORMATICALT
2002
91views more  INFORMATICALT 2002»
15 years 1 months ago
Bayesian Heuristic Approach to Scheduling
Abstract. Real life scheduling problems are solved by heuristics with parameters defined by experts, as usual. In this paper a new approach is proposed where the parameters of vari...
Jonas Mockus
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
15 years 6 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
131
Voted
PR
2006
84views more  PR 2006»
15 years 1 months ago
Document zone content classification and its performance evaluation
This paper describes an algorithm for the determination of zone content type of a given zone within a document image. We take a statistical based approach and represent each zone ...
Yalin Wang, Ihsin T. Phillips, Robert M. Haralick
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 7 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay