Sciweavers

679 search results - page 49 / 136
» Algorithmic modifications to SPIHT
Sort
View
110
Voted
SODA
2010
ACM
173views Algorithms» more  SODA 2010»
16 years 1 days ago
Distributed Agreement with Optimal Communication Complexity
We consider the problem of fault-tolerant agreement in a crash-prone synchronous system. We present a new randomized consensus algorithm that achieves optimal communication effici...
Seth Gilbert, Dariusz Kowalski
144
Voted
COLCOM
2008
IEEE
15 years 9 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
119
Voted
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
15 years 8 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
125
Voted
MOBICOM
2000
ACM
15 years 7 months ago
Distributed fair scheduling in a wireless LAN
—Fairness is an important issue when accessing a shared wireless channel. With fair scheduling, it is possible to allocate bandwidth in proportion to weights of the packet flows ...
Nitin H. Vaidya, Paramvir Bahl, Seema Gupta
135
Voted
RT
2000
Springer
15 years 6 months ago
Soft Shadow Maps for Linear Lights
Soft shadows and penumbra regions generated by extended light sources such as linear and area lights are visual effects that significantly contribute to the realism of a scene. In ...
Wolfgang Heidrich, Stefan Brabec, Hans-Peter Seide...