Results 1 - 10
of
4,323
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
, 1995
"... We present a digital signature scheme based on the computational diculty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice (where each message may be chosen in a ..."
Abstract
-
Cited by 959 (40 self)
- Add to MetaCart
in a way that depends on the signatures of previously chosen messages) can not later forge the signature of even a single additional message. This may be somewhat surprising, since the properties of having forgery being equivalent to factoring and being invulnerable to an adaptive chosen-message attack
A message ferrying approach for data delivery in sparse mobile ad hoc networks
- In Proc. of ACM Mobihoc
, 2004
"... Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and self-configuring network capacity required in many critical applications, e.g., battlefields, disaster relief and wide area sensing. In this paper we study the problem of efficient data delivery in sparse MANETs where network partitions ..."
Abstract
-
Cited by 498 (14 self)
- Add to MetaCart
can last for a significant period. Previous approaches rely on the use of either long range communication which leads to rapid draining of nodes ’ limited batteries, or existing node mobility which results in low data delivery rates and large delays. In this paper, we describe a Message Ferrying (MF
Previous messages provide the key to achieve shannon capacity in a wiretap channel
- in Communications Workshops (ICC), 2013 IEEE International Conference on. IEEE, 2013
"... ar ..."
How practical is network coding?
, 2006
"... With network coding, intermediate nodes between the source and the receivers of an end-to-end communication session are not only capable of relaying and replicating data messages, but also of coding incoming messages to produce coded outgoing ones. Recent studies have shown that network coding is ..."
Abstract
-
Cited by 1016 (23 self)
- Add to MetaCart
With network coding, intermediate nodes between the source and the receivers of an end-to-end communication session are not only capable of relaying and replicating data messages, but also of coding incoming messages to produce coded outgoing ones. Recent studies have shown that network coding
Pregel: A system for large-scale graph processing
- IN SIGMOD
, 2010
"... Many practical computing problems concern large graphs. Standard examples include the Web graph and various social networks. The scale of these graphs—in some cases billions of vertices, trillions of edges—poses challenges to their efficient processing. In this paper we present a computational model ..."
Abstract
-
Cited by 496 (0 self)
- Add to MetaCart
model suitable for this task. Programs are expressed as a sequence of iterations, in each of which a vertex can receive messages sent in the previous iteration, send messages to other vertices, and modify its own state and that of its outgoing edges or mutate graph topology. This vertex-centric approach
Generative communication in Linda
- ACM Transactions on Programming Languages and Systems
, 1985
"... Generative communication is the basis of a new distributed programming langauge that is intended for systems programming in distributed settings generally and on integrated network computers in particular. It differs from previous interprocess communication models in specifying that messages be adde ..."
Abstract
-
Cited by 1194 (2 self)
- Add to MetaCart
Generative communication is the basis of a new distributed programming langauge that is intended for systems programming in distributed settings generally and on integrated network computers in particular. It differs from previous interprocess communication models in specifying that messages
Loopy belief propagation for approximate inference: An empirical study. In:
- Proceedings of Uncertainty in AI,
, 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract
-
Cited by 676 (15 self)
- Add to MetaCart
with a single loop • Unless all the conditional probabilities are deter ministic, belief propagation will converge. • There is an analytic expression relating the cor rect marginals to the loopy marginals. The ap proximation error is related to the convergence rate of the messages -the faster
RSVP: A New Resource Reservation Protocol
, 1993
"... Whe origin of the RSVP protocol can be traced back to 1991, when a team of network researchers, including myself, started playing with a number of packet scheduling algorithms on the DARTNET (DARPA Testbed NETwork), a network testbed made of open source, workstation-based routers. Because scheduling ..."
Abstract
-
Cited by 1005 (25 self)
- Add to MetaCart
that could support both unicast and many-to-many multicast applications. That effort led to the birth of RSVP. As a signaling protocol designed specifically to run over IP, RSVP distinguishes itself from previous signaling protocols in several fundamental ways. The most profound ones include a soft
Online Discussion Processes: Effects of the Previous Messages ' Evaluations, Knowledge Content, Social Cues and Personal Information on the Current Message
"... This study of the flow of online discussions examined how previous messages affected the current message along five dimensions: (1) evaluations (agreement, disagreement, or unresponsive actions); (2) knowledge content (contribution, repetition, or null content); (3) social cues (positive, negative, ..."
Abstract
- Add to MetaCart
This study of the flow of online discussions examined how previous messages affected the current message along five dimensions: (1) evaluations (agreement, disagreement, or unresponsive actions); (2) knowledge content (contribution, repetition, or null content); (3) social cues (positive, negative
Computer Mediated Discussions: Effects of the Previous Messages ' Evaluations, Knowledge Content, Social Cues and Personal Information on the Current Message
"... Abstract: This study of the flow of online discussions examined how previous messages affected the current message along five dimensions: (1) evaluations (agreement, disagreement, or unresponsive actions); (2) knowledge content (contribution, repetition, or null content); (3) social cues (positive, ..."
Abstract
- Add to MetaCart
Abstract: This study of the flow of online discussions examined how previous messages affected the current message along five dimensions: (1) evaluations (agreement, disagreement, or unresponsive actions); (2) knowledge content (contribution, repetition, or null content); (3) social cues (positive
Results 1 - 10
of
4,323