Sciweavers

1458 search results - page 55 / 292
» The sequentially realizable functionals
Sort
View
CSFW
2008
IEEE
15 years 10 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
134
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
Bounding the power rate function of wireless ad hoc networks
Abstract— Given a wireless ad hoc network and an endto-end traffic pattern, the power rate function refers to the minimum total power required to support different throughput un...
Yunnan Wu, Qian Zhang, Wenwu Zhu, Sun-Yuan Kung
134
Voted
AMMA
2009
Springer
15 years 10 months ago
Auctions with Dynamic Populations: Efficiency and Revenue Maximization
ABSTRACT: We examine an environment where goods and privately informed buyers arrive stochastically to a market. A seller in this setting faces a sequential allocation problem with...
Maher Said
ALP
1992
Springer
15 years 7 months ago
Definitional Trees
Rewriting is a computational paradigm that specifies the actions, but not the control. We introduce a hierarchical structure repreat a high level of abstraction, a form of control....
Sergio Antoy
EUSFLAT
2007
118views Fuzzy Logic» more  EUSFLAT 2007»
15 years 4 months ago
A Less Cumulative Algorithm of Mining Linguistic Browsing Patterns in the World Wide Web
Finding sequential patterns is one of important issues in data mining. This paper deals with linguistic (fuzzy) sequential patterns. The existing algorithms for discovering such p...
Krzysztof Dyczkowski