Sciweavers

217 search results - page 37 / 44
» Conflict analysis
Sort
View
TWC
2008
138views more  TWC 2008»
13 years 7 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
TDSC
2011
13 years 2 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
CSCL
2008
106views more  CSCL 2008»
13 years 7 months ago
Operationalizing macro-scripts in CSCL technological settings
: This paper presents a conceptual analysis of the technological dimensions related to the operationalization of CSCL macro-scripts. CSCL scripts are activity models that aim at en...
Pierre Tchounikine
BMCBI
2004
115views more  BMCBI 2004»
13 years 7 months ago
An SVD-based comparison of nine whole eukaryotic genomes supports a coelomate rather than ecdysozoan lineage
Background: Eukaryotic whole genome sequences are accumulating at an impressive rate. Effective methods for comparing multiple whole eukaryotic genomes on a large scale are needed...
Gary W. Stuart, Michael W. Berry
PPOPP
2010
ACM
14 years 4 months ago
Using data structure knowledge for efficient lock generation and strong atomicity
To achieve high-performance on multicore systems, sharedmemory parallel languages must efficiently implement atomic operations. The commonly used and studied paradigms for atomici...
Gautam Upadhyaya, Samuel P. Midkiff, Vijay S. Pai