Sciweavers

2059 search results - page 1 / 412
» A Directed Threshold - Signature Scheme
Sort
View
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
14 years 5 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
CCR
2002
112views more  CCR 2002»
13 years 10 months ago
New directions in traffic measurement and accounting
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they...
Cristian Estan, George Varghese
ICCD
2002
IEEE
93views Hardware» more  ICCD 2002»
14 years 7 months ago
Impact of Scaling on the Effectiveness of Dynamic Power Reduction Schemes
Power is considered to be the major limiter to the design of more faster and complex processors in the near future. In order to address this challenge, a combination of process, c...
David Duarte, Narayanan Vijaykrishnan, Mary Jane I...
CN
2004
107views more  CN 2004»
13 years 10 months ago
A multicriteria handoff decision scheme for the next generation tactical communications systems
In this paper a novel handoff decision algorithm for the mobile subsystem of tactical communications systems is introduced. In this algorithm, handoff decision metrics are: receiv...
Tolga Onel, Cem Ersoy, Erdal Cayirci, Gerard Parr
PODS
2004
ACM
148views Database» more  PODS 2004»
14 years 11 months ago
Deterministic Wavelet Thresholding for Maximum-Error Metrics
Several studies have demonstrated the effectiveness of the wavelet decomposition as a tool for reducing large amounts of data down to compact wavelet synopses that can be used to ...
Minos N. Garofalakis, Amit Kumar