Sciweavers

660 search results - page 115 / 132
» words 2003
Sort
View
SODA
2003
ACM
122views Algorithms» more  SODA 2003»
14 years 11 months ago
Fast distributed algorithms for (weakly) connected dominating sets and linear-size skeletons
Motivated by routing issues in ad hoc networks, we present polylogarithmic-time distributed algorithms for two problems. Given a network, we first show how to compute connected a...
Devdatt P. Dubhashi, Alessandro Mei, Alessandro Pa...
TREC
2003
14 years 11 months ago
QUALIFIER In TREC-12 QA Main Task
This paper describes a question answering system and its various modules to solve definition, factoid and list questions defined in the TREC12 Main task. In particular, we tackle ...
Hui Yang, Hang Cui, Mstislav Maslennikov, Long Qiu...
4OR
2006
118views more  4OR 2006»
14 years 9 months ago
Dealing with inconsistent judgments in multiple criteria sorting models
Sorting models consist in assigning alternatives evaluated on several criteria to ordered categories. To implement such models it is necessary to set the values of the preference p...
Vincent Mousseau, Luis C. Dias, José Rui Fi...
DAM
2006
121views more  DAM 2006»
14 years 9 months ago
Fine-grained forward-secure signature schemes without random oracles
We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-...
Jan Camenisch, Maciej Koprowski
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
14 years 9 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao