Sciweavers

7992 search results - page 1532 / 1599
» Communication Abstractions for Distributed Systems
Sort
View
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
14 years 2 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...
IPPS
2006
IEEE
14 years 2 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
ACMMSP
2006
ACM
260views Hardware» more  ACMMSP 2006»
14 years 2 months ago
Seven at one stroke: results from a cache-oblivious paradigm for scalable matrix algorithms
A blossoming paradigm for block-recursive matrix algorithms is presented that, at once, attains excellent performance measured by • time, • TLB misses, • L1 misses, • L2 m...
Michael D. Adams, David S. Wise
IMC
2006
ACM
14 years 2 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta
IMC
2006
ACM
14 years 2 months ago
Towards IP geolocation using delay and topology measurements
We present Topology-based Geolocation (TBG), a novel approach to estimating the geographic location of arbitrary Internet hosts. We motivate our work by showing that 1) existing a...
Ethan Katz-Bassett, John P. John, Arvind Krishnamu...
« Prev « First page 1532 / 1599 Last » Next »