Sciweavers

2642 search results - page 160 / 529
» The development of Chez Scheme
Sort
View
ECCC
2011
185views ECommerce» more  ECCC 2011»
14 years 7 months ago
Property Testing Lower Bounds via Communication Complexity
We develop a new technique for proving lower bounds in property testing, by showing a strong connection between testing and communication complexity. We give a simple scheme for r...
Eric Blais, Joshua Brody, Kevin Matulef
115
Voted
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 7 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
130
Voted
JAIR
2010
130views more  JAIR 2010»
14 years 7 months ago
Interactive Cost Configuration Over Decision Diagrams
In many AI domains such as product configuration, a user should interactively specify a solution that must satisfy a set of constraints. In such scenarios, offline compilation of ...
Henrik Reif Andersen, Tarik Hadzic, David Pisinger
JDCTA
2010
171views more  JDCTA 2010»
14 years 7 months ago
Computer Interaction System using Hand Posture Identification
Natural and friendly interface is critical for the development of service robots. Gesture-based interface offers a way to enable untrained users to interact with robots more easil...
Sushma D. Ghode, S. A. Chhabria, R. V. Dharaskar
154
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 7 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao