Sciweavers

13457 search results - page 114 / 2692
» Can we elect if we cannot compare
Sort
View
FORTE
2007
13 years 10 months ago
The DHCP Failover Protocol: A Formal Perspective
Abstract. We present a formal specification and analysis of a faulttolerant DHCP algorithm, used to automatically configure certain host parameters in an IP network. Our algorith...
Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy ...
TISSEC
2010
72views more  TISSEC 2010»
13 years 7 months ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...
BROADNETS
2005
IEEE
14 years 2 months ago
Performance analysis and enhancement for backbone based wireless mobile ad hoc networks
—In this paper, we present an extended Mobile Backbone Network (MBN) topology synthesis algorithm (ETSA) for constructing and maintaining a dynamic backbone structure in mobile w...
Laura Huei-jiun Ju, Izhak Rubin
ITS
1992
Springer
152views Multimedia» more  ITS 1992»
14 years 1 months ago
People Power: A Human-Computer Collaborative Learning System
Abstract. This paper reports our research work in the new field of humancomputer collaborative learning (HCCL). The general architecture of an HCCL is defined. An HCCL system, call...
Pierre Dillenbourg, John A. Self
SOCIALCOM
2010
13 years 6 months ago
A Scalable Framework for Modeling Competitive Diffusion in Social Networks
Multiple phenomena often diffuse through a social network, sometimes in competition with one another. Product adoption and political elections are two examples where network diffus...
Matthias Broecheler, Paulo Shakarian, V. S. Subrah...