Sciweavers

273 search results - page 54 / 55
» Bayesian Communication under Rough Sets Information
Sort
View
JNW
2008
117views more  JNW 2008»
13 years 6 months ago
An Intelligent Multicast Ad-hoc On demand Distance Vector Protocol for MANETs
-Recently multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication. This includes application such as multipoint data disseminat...
E. Baburaj, V. Vasudevan
COMSIS
2004
80views more  COMSIS 2004»
13 years 6 months ago
The End of Software Engineering and the Start of Economic-Cooperative Gaming
"Software engineering" was introduced as a model for the field of software development in 1968. This paper reconsiders that model in the light of four decades of experie...
Alistair Cockburn
SENSYS
2010
ACM
13 years 4 months ago
eShare: a capacitor-driven energy storage and sharing network for long-term operation
The ability to move energy around makes it feasible to build distributed energy storage systems that can robustly extend the lifetime of networked sensor systems. eShare supports ...
Ting Zhu, Yu Gu, Tian He, Zhi-Li Zhang
CCS
2010
ACM
13 years 3 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
IACR
2011
89views more  IACR 2011»
12 years 6 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown