Sciweavers

423 search results - page 56 / 85
» Specifying Strategies for Exercises
Sort
View
MSN
2007
Springer
192views Sensor Networks» more  MSN 2007»
15 years 4 months ago
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distr...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
ICRA
2006
IEEE
183views Robotics» more  ICRA 2006»
15 years 4 months ago
Anytime Dynamic Path-planning with Flexible Probabilistic Roadmaps
Abstract— Probabilistic roadmaps (PRM) have been demonstrated to be very promising for planning paths for robots with high degrees of freedom in complex 3D workspaces. In this pa...
Khaled Belghith, Froduald Kabanza, Leo Hartman, Ro...
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
15 years 4 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra
UIST
2006
ACM
15 years 3 months ago
RecipeSheet: creating, combining and controlling information processors
Many tasks require users to extract information from diverse sources, to edit or process this information locally, and to explore how the end results are affected by changes in th...
Aran Lunzer, Kasper Hornbæk
WECWIS
2005
IEEE
94views ECommerce» more  WECWIS 2005»
15 years 3 months ago
Electronic Trading in Order-Driven Markets: Efficient Execution
In this paper, we address the importance of efficient execution in electronic markets. Due to intense competition for profit opportunities, trading costs can represent a significa...
Yuriy Nevmyvaka, Michael S. Kearns, Amy Papandreou...