Sciweavers

1718 search results - page 132 / 344
» Communicating more than nothing
Sort
View
FC
2007
Springer
118views Cryptology» more  FC 2007»
14 years 2 months ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
UIC
2007
Springer
14 years 2 months ago
Maximizing Network Lifetime Under Reliability Constraints Using a Cross-Layer Design in Dense Wireless Sensor Networks
Abstract. Recent experimental studies have shown that radio links between low-power devices are extremely unreliable. In particular, the instability and unpredictability of low-pow...
Shan Guo Quan, Young Yong Kim
IUI
2004
ACM
14 years 1 months ago
Speech and sketching for multimodal design
While sketches are commonly and effectively used in the early stages of design, some information is far more easily conveyed verbally than by sketching. In response, we have combi...
Aaron Adler, Randall Davis
HICSS
2003
IEEE
108views Biometrics» more  HICSS 2003»
14 years 1 months ago
Border Node Retransmission Based Probabilistic Broadcast Protocols in Ad-Hoc Networks
In this paper, we propose some improvements to the flooding protocols that aim to efficiently broadcast a given information through the whole ad-hoc network. These improvements ...
Julien Cartigny, David Simplot
SRDS
2000
IEEE
14 years 20 days ago
Dynamic Node Management and Measure Estimation in a State-Driven Fault Injector
Validation of distributed systems using fault injection is difficult because of their inherent complexity, lack of a global clock, and lack of an easily accessible notion of a gl...
Ramesh Chandra, Michel Cukier, Ryan M. Lefever, Wi...