Sciweavers

346 search results - page 45 / 70
» Can we trust docking results
Sort
View
JSAC
2006
136views more  JSAC 2006»
13 years 7 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
ECWEB
2010
Springer
162views ECommerce» more  ECWEB 2010»
13 years 5 months ago
The Open Metaverse Currency (OMC) - A Micropayment Framework for Open 3D Virtual Worlds
: Virtual worlds have become very popular recently, in particular 3D virtual worlds with a built-in virtual currency that enables providers and users to monetize their creations. V...
Frank Kappe, Michael Steurer
CGO
2006
IEEE
13 years 11 months ago
Compiler Optimizations to Reduce Security Overhead
In this work, we present several compiler optimizations to reduce the overhead due to software protection. We first propose an aggressive rematerialization algorithm which attempt...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
ALT
2008
Springer
14 years 4 months ago
On-Line Probability, Complexity and Randomness
Abstract. Classical probability theory considers probability distributions that assign probabilities to all events (at least in the finite case). However, there are natural situat...
Alexey V. Chernov, Alexander Shen, Nikolai K. Vere...
WIMOB
2008
IEEE
14 years 2 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...