Sciweavers

2261 search results - page 299 / 453
» Dynamic types for authentication
Sort
View
CDC
2010
IEEE
148views Control Systems» more  CDC 2010»
13 years 4 months ago
Convergence rates of consensus algorithms in stochastic networks
Abstract-- We study the convergence rate of average consensus algorithms in networks with stochastic communication failures. We show how the system dynamics can be modeled by a dis...
Stacy Patterson, Bassam Bamieh
CORR
2011
Springer
142views Education» more  CORR 2011»
13 years 4 months ago
Power Allocation Games in Interference Relay Channels: Existence Analysis of Nash Equilibria
We consider a network composed of two interfering point-to-point links where the two transmitters can exploit one common relay node to improve their individual transmission rate. ...
Elena Veronica Belmega, Samson Lasaulce
CORR
2011
Springer
536views Education» more  CORR 2011»
13 years 4 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
SIGARCH
2010
91views more  SIGARCH 2010»
13 years 3 months ago
Programming framework for clusters with heterogeneous accelerators
We describe a programming framework for high performance clusters with various hardware accelerators. In this framework, users can utilize the available heterogeneous resources pr...
Kuen Hung Tsoi, Anson H. T. Tse, Peter Pietzuch, W...
CF
2011
ACM
12 years 9 months ago
Hybrid high-performance low-power and ultra-low energy reliable caches
Ubiquitous computing has become a very popular paradigm. The most suitable technological solution for those systems consists of using hybrid processors able to operate at high vol...
Bojan Maric, Jaume Abella, Francisco J. Cazorla, M...