Sciweavers

3228 search results - page 422 / 646
» Computationally Sound Proofs
Sort
View
132
Voted
LCN
2008
IEEE
15 years 10 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
ACSC
2007
IEEE
15 years 10 months ago
On Inferences of Full Hierarchical Dependencies
Full hierarchical dependencies (FHDs) constitute a large class of relational dependencies. A relation exhibits an FHD precisely when it can be decomposed into at least two of its ...
Sven Hartmann, Sebastian Link
116
Voted
BROADNETS
2007
IEEE
15 years 10 months ago
Modeling and generating TCP application workloads
Abstract — In order to perform valid experiments, traffic generators used in network simulators and testbeds require up to date models of traffic as it exists on real network lin...
Félix Hernández-Campos, Kevin Jeffay...
133
Voted
ICPP
2007
IEEE
15 years 10 months ago
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach
– Anonymous communication systems built on P2P infrastructures using anonymity forwarders are frequently affected by the churn problem, i.e. frequent joins and leaves of nodes. T...
Souvik Ray, Giora Slutzki, Zhao Zhang
118
Voted
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
15 years 9 months ago
Analysis of noisy time-series signals with GA involving viral infection with tropism
In this paper we report on a study in which genetic algorithms are applied to the analysis of noisy time-series signals, which is related to the problem of analyzing the motion ch...
Yuji Sato, Yuta Yasuda, Ryuji Goto