Sciweavers

338 search results - page 63 / 68
» A New Key Distribution Scheme for Secure Multicast Communica...
Sort
View
CORR
2011
Springer
150views Education» more  CORR 2011»
13 years 5 months ago
Optimal coding for the deletion channel with small deletion probability
The deletion channel is the simplest point-to-point communication channel that models lack of synchronization. Input bits are deleted independently with probability d, and when th...
Yashodhan Kanoria, Andrea Montanari
ASIACRYPT
2005
Springer
14 years 4 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...
GLOBECOM
2009
IEEE
14 years 2 months ago
Route Capacity Estimation Based Admission Control and QoS Routing for Mesh Networks
Wireless Mesh Networks (WMNs) is a promising key technology for next generation wireless backhauling that is expected to support various types of applications with different qualit...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung
IEEEPACT
2002
IEEE
14 years 3 months ago
Exploiting Pseudo-Schedules to Guide Data Dependence Graph Partitioning
This paper presents a new modulo scheduling algorithm for clustered microarchitectures. The main feature of the proposed scheme is that the assignment of instructions to clusters ...
Alex Aletà, Josep M. Codina, F. Jesú...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 5 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...