Sciweavers

2814 search results - page 410 / 563
» Competitive Analysis of Distributed Algorithms
Sort
View
GLOBECOM
2008
IEEE
13 years 10 months ago
An Efficient Group Key Management for Secure Routing in Ad Hoc Networks
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...
CONCURRENCY
2008
84views more  CONCURRENCY 2008»
13 years 10 months ago
Dynamic allocation in a self-scaling cluster database
Abstract. Database systems have been vital for all forms of data processing for a long time. In recent years, the amount of processed data has been growing dramatically, even in sm...
Tilmann Rabl, Marc Pfeffer, Harald Kosch
CORR
2008
Springer
114views Education» more  CORR 2008»
13 years 10 months ago
Network-based consensus averaging with general noisy channels
This paper focuses on the consensus averaging problem on graphs under general noisy channels. We study a particular class of distributed consensus algorithms based on damped updat...
Ram Rajagopal, Martin J. Wainwright
CORR
2008
Springer
133views Education» more  CORR 2008»
13 years 10 months ago
Estimating divergence functionals and the likelihood ratio by convex risk minimization
We develop and analyze M-estimation methods for divergence functionals and the likelihood ratios of two probability distributions. Our method is based on a non-asymptotic variatio...
XuanLong Nguyen, Martin J. Wainwright, Michael I. ...
JSA
2007
89views more  JSA 2007»
13 years 10 months ago
Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard
— Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Methods based on traditional fault-tolerant architectures are not suited for prot...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...