Sciweavers

3775 search results - page 142 / 755
» The Expression Problem Revisited
Sort
View
149
Voted
FC
2005
Springer
171views Cryptology» more  FC 2005»
15 years 9 months ago
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
Abstract. We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of sho...
Fangguo Zhang, Willy Susilo, Yi Mu
137
Voted
BTW
2005
Springer
118views Database» more  BTW 2005»
15 years 9 months ago
The MINERVA Project: Database Selection in the Context of P2P Search
: This paper presents the MINERVA project that protoypes a distributed search engine based on P2P techniques. MINERVA is layered on top of a Chord-style overlay network and uses a ...
Matthias Bender, Sebastian Michel, Gerhard Weikum,...
113
Voted
DSN
2002
IEEE
15 years 8 months ago
A Realistic Look At Failure Detectors
This paper shows that, in an environment where we do not bound the number of faulty processes, the class P of Perfect failure detectors is the weakest (among realistic failure det...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
150
Voted
CONEXT
2007
ACM
15 years 7 months ago
Scalable real-time gateway assignment in mobile mesh networks
The perception of future wireless mesh network (WMN) deployment and usage is rapidly evolving. WMNs are now being envisaged to provide citywide "last-mile" access for nu...
Edward Bortnikov, Israel Cidon, Idit Keidar
120
Voted
AAAI
2008
15 years 6 months ago
Efficient Optimization of Information-Theoretic Exploration in SLAM
We present a novel method for information-theoretic exploration, leveraging recent work on mapping and localization. We describe exploration as the constrained optimization proble...
Thomas Kollar, Nicholas Roy