Sciweavers

214 search results - page 20 / 43
» Construction and Analysis of Web-Based Computer Science Info...
Sort
View
IACR
2011
105views more  IACR 2011»
12 years 7 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi

Publication
182views
15 years 6 months ago
The ERICA Switch Algorithm for ABR Traffic Management in ATM Networks
We propose an explicit rate indication scheme for congestion avoidance in ATM networks. In this scheme, the network switches monitor their load on each link, determining a load fac...
Shivkumar Kalyanaraman, Raj Jain, Sonia Fahmy, Roh...
VISSYM
2004
13 years 9 months ago
Visual Triangulation of Network-Based Phylogenetic Trees
Phylogenetic trees are built by examining differences in the biological traits of a set of species. An example of such a trait is a biological network such as a metabolic pathway,...
Ulrik Brandes, Tim Dwyer, Falk Schreiber
CHI
2008
ACM
14 years 8 months ago
Friends and foes: ideological social networking
Traditional online social network sites use a single monolithic "friends" relationship to link users. However, users may have more in common with strangers, suggesting t...
Gábor Szabó, Michael J. Brzozowski, ...
MOBIHOC
2005
ACM
14 years 7 months ago
Low-coordination topologies for redundancy in sensor networks
Tiny, low-cost sensor devices are expected to be failure-prone and hence in many realistic deployment scenarios for sensor networks these nodes are deployed in higher than necessa...
Rajagopal Iyengar, Koushik Kar, Suman Banerjee