Sciweavers

2680 search results - page 202 / 536
» The topology of the independence complex
Sort
View
DCC
2002
IEEE
16 years 1 months ago
Globally Optimal Uneven Error-Protected Packetization of Scalable Code Streams
In this paper, we present a family of new algorithms for rate-fidelity optimal packetization of scalable source bit streams with uneven error protection. In the most general settin...
Sorina Dumitrescu, Xiaolin Wu, Zhe Wang
ESORICS
2004
Springer
15 years 6 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen
106
Voted
MMAS
2004
Springer
15 years 6 months ago
Challenges in Building Very Large Teams
Abstract. When agents coordinate according to the principles of teamwork they can flexibly, robustly and reliably achieve complex goals in complex, dynamic and even hostile enviro...
Paul Scerri, Katia Sycara-Cyranski
MASCOTS
2010
15 years 2 months ago
Expanding the Event Horizon in Parallelized Network Simulations
The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technolog...
Georg Kunz, Olaf Landsiedel, Stefan Götz, Kla...
NAACL
2003
15 years 2 months ago
Automatic Extraction of Semantic Networks from Text using Leximancer
Leximancer is a software system for performing conceptual analysis of text data in a largely language independent manner. The system is modelled on Content Analysis and provides u...
Andrew E. Smith