Sciweavers

2135 search results - page 215 / 427
» Applications and Issues in Pen-Centric Computing
Sort
View
CCS
2007
ACM
14 years 4 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
MIDDLEWARE
2007
Springer
14 years 4 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
SAC
2006
ACM
14 years 4 months ago
Ubiquitous presence systems
Instant messaging has become a part of our daily live. Instant communication, either with a mobile device or with a computer based application, is an increasingly used form of com...
Matthias Kranz, Paul Holleis, Albrecht Schmidt
PEWASUN
2005
ACM
14 years 3 months ago
Impact of multipath fading in wireless ad hoc networks
This paper examines several MANET behaviors and suggests root causes using a stochastic model of received power. It focuses specifically on MANET mechanisms most impacted by fin...
John Mullen, Hong Huang
EGC
2005
Springer
14 years 3 months ago
A Grid-Oriented Genetic Algorithm
Genetic algorithms (GAs) are stochastic search methods that have been successfully applied in many search, optimization, and machine learning problems. Their parallel counterpart (...
Jose Herrera, Eduardo Huedo, Rubén S. Monte...