Sciweavers

1484 search results - page 286 / 297
» Ants meeting algorithms
Sort
View
WPES
2003
ACM
14 years 29 days ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
ASM
2003
ASM
14 years 28 days ago
A Framework for Proving Contract-Equipped Classes
r in: Abstract State Machines 2003 — Advances in Theory and Applications, Proc. 10th International Workshop, Taormina, Italy, March 3-7, 2003, eds. Egon Boerger, Angelo Gargantin...
Bertrand Meyer
EDBT
2010
ACM
172views Database» more  EDBT 2010»
14 years 25 days ago
Privacy preserving group nearest neighbor queries
User privacy in location-based services has attracted great interest in the research community. We introduce a novel framework based on a decentralized architecture for privacy pr...
Tanzima Hashem, Lars Kulik, Rui Zhang
ICALP
2010
Springer
14 years 15 days ago
Placing Regenerators in Optical Networks to Satisfy Multiple Sets of Requests
The placement of regenerators in optical networks has become an active area of research during the last years. Given a set of lightpaths in a network G and a positive integer d, re...
George B. Mertzios, Ignasi Sau, Mordechai Shalom, ...
RTAS
1998
IEEE
13 years 12 months ago
End-Host Architecture for QoS-Adaptive Communication
Proliferation of communication-intensive real-time applications with elastic" timeliness constraints, such as streaming stored video, requires a new design for endhost commun...
Tarek F. Abdelzaher, Kang G. Shin