Sciweavers

14190 search results - page 2760 / 2838
» compute 2008
Sort
View
CCS
2008
ACM
14 years 11 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
DNA
2008
Springer
14 years 11 months ago
A Simple DNA Gate Motif for Synthesizing Large-Scale Circuits
The prospects of programming molecular systems to perform complex autonomous tasks has motivated research into the design of synthetic biochemical circuits. Of particular interest ...
Lulu Qian, Erik Winfree
VLDB
2008
ACM
110views Database» more  VLDB 2008»
15 years 10 months ago
Enhancing histograms by tree-like bucket indices
Histograms are used to summarize the contents of relations into a number of buckets for the estimation of query result sizes. Several techniques (e.g., MaxDiff and V-Optimal) have ...
Francesco Buccafurri, Gianluca Lax, Domenico SaccĂ...
WCNC
2008
IEEE
15 years 4 months ago
On Reducing Broadcast Transmission Cost and Redundancy in Ad Hoc Wireless Networks Using Directional Antennas
—Using directional antennas to conserve bandwidth and energy consumption in ad hoc wireless networks has attracted much attention of the research community in recent years. Howev...
Ling Ding, Yifeng Shao, Minglu Li
AIMSA
2008
Springer
15 years 4 months ago
Noun Compound Interpretation Using Paraphrasing Verbs: Feasibility Study
Abstract. The paper addresses an important challenge for the automatic processing of English written text: understanding noun compounds’ semantics. Following Downing (1977) [1], ...
Preslav Nakov
« Prev « First page 2760 / 2838 Last » Next »