Sciweavers

229 search results - page 25 / 46
» Agreements Without Disagreements
Sort
View
JAR
2006
107views more  JAR 2006»
13 years 9 months ago
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
Automated tools for finding attacks on flawed security protocols often fail to quately with group protocols. This is because the abstractions made to improve performance on fixed ...
Graham Steel, Alan Bundy
TWC
2008
143views more  TWC 2008»
13 years 9 months ago
Mobile Privacy in Wireless Networks-Revisited
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...
Caimu Tang, Dapeng Oliver Wu
MICCAI
2010
Springer
13 years 8 months ago
Segmentation Subject to Stitching Constraints: Finding Many Small Structures in a Large Image
International Conference on Medical Image Computing and Computer Assisted Intervention, Beijing, China, 20-24 September 2010 Extracting numerous cells in a large microscopic image...
Elena Bernardis, Stella X. Yu
ICIP
2010
IEEE
13 years 7 months ago
GAME-theory-based cross-layer optimization for wireless DS-CDMA visual sensor networks
We propose a game-theory-based cross-layer optimization scheme for wireless Direct Sequence Code Division Multiple Access (DSCDMA) visual sensor networks. The scheme uses the Nash...
Lisimachos P. Kondi, Elizabeth S. Bentley
SIAMCOMP
2010
97views more  SIAMCOMP 2010»
13 years 4 months ago
Lower Bounds for Randomized Consensus under a Weak Adversary
This paper studies the inherent trade-off between termination probability and total step complexity of randomized consensus algorithms. It shows that for every integer k, the prob...
Hagit Attiya, Keren Censor-Hillel