Sciweavers

191 search results - page 24 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
ISCAPDCS
2003
13 years 10 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
JMIV
2006
166views more  JMIV 2006»
13 years 8 months ago
Fast Surface Segmentation Guided by User Input Using Implicit Extension of Minimal Paths
We introduce a novel implicit approach for single object segmentation in 3D images. The boundary surface of this object is assumed to contain two or more known curves (the constrai...
Roberto Ardon, Laurent D. Cohen, Anthony J. Yezzi
IOR
2008
113views more  IOR 2008»
13 years 7 months ago
Finding Supply Function Equilibria with Asymmetric Firms
Abstract Firms compete in supply functions when they offer a schedule of prices and quantities into a market; for example, this occurs in many wholesale electricity markets. We stu...
Edward J. Anderson, Xinmin Hu
TON
2010
157views more  TON 2010»
13 years 3 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
DATE
2008
IEEE
161views Hardware» more  DATE 2008»
14 years 3 months ago
Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis
In the field of the Side Channel Analysis, hardware distortions such as glitches and random frequency are classical countermeasures. A glitch influences the side channel amplitu...
Denis Réal, Cécile Canovas, Jessy Cl...