Sciweavers

341 search results - page 15 / 69
» The way forward
Sort
View
EACL
2006
ACL Anthology
14 years 11 months ago
Inheritance and the CCG Lexicon
I propose a uniform approach to the elimination of redundancy in CCG lexicons, where grammars incorporate inheritance hierarchies of lexical types, defined over a simple, feature-...
Mark McConville
CEC
2007
IEEE
15 years 1 months ago
Preventing selfish behavior in Ad Hoc networks
Cooperation enforcement is one of the key issues in ad hoc networks. In this paper we proposes a new strategy driven approach that aims at discouraging selfish behavior among netwo...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
IJNSEC
2008
104views more  IJNSEC 2008»
14 years 9 months ago
Solutions to Key Exposure Problem in Ring Signature
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we propose the first forward secure ring signature scheme and the first key-insul...
Joseph K. Liu, Duncan S. Wong
INFOCOM
2005
IEEE
15 years 3 months ago
Probabilistic QoS guarantee in reliability and timeliness domains in wireless sensor networks
— In this paper, we present a novel packet delivery mechanism called Multi-path and Multi-Speed Routing Protocol (MMSPEED) for probabilistic QoS guarantee in wireless sensor netw...
Emad Felemban, Chang-Gun Lee, Eylem Ekici, Ryan Bo...
PERCOM
2005
ACM
15 years 9 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin