Sciweavers

835 search results - page 114 / 167
» Characterizing rosy theories
Sort
View
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
14 years 4 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
VTC
2008
IEEE
152views Communications» more  VTC 2008»
14 years 4 months ago
Network Controlled Joint Radio Resource Management for Heterogeneous Networks
Abstract— In this paper, we propose a way of achieving optimality in radio resource management (RRM) for heterogeneous networks. We consider a micro or femto cell with two co-loc...
Marceau Coupechoux, Jean Marc Kelif, Philippe Godl...
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
14 years 4 months ago
Supporting Knowledge Transfer through Decomposable Reasoning Artifacts
Technology to support knowledge transfer and cooperative inquiry must offer its users the ability to effectively interpret knowledge structures produced by collaborators. Communic...
William Pike, Richard May, Alan Turner
ICC
2007
IEEE
160views Communications» more  ICC 2007»
14 years 4 months ago
Opportunistic Cooperation for Quality of Service Provisionings Over Wireless Relay Networks
Abstract— We propose the QoS-driven opportunistic cooperation schemes for the wireless relay networks. By integrating information theory with the concept of effective capacity, o...
Lin Xie, Xi Zhang
LICS
2007
IEEE
14 years 4 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam