Sciweavers

403 search results - page 48 / 81
» Efficient Algorithms for Secure Multicast key Management
Sort
View
ITCC
2005
IEEE
14 years 2 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
WCNC
2010
IEEE
14 years 20 days ago
Measurement-Based Channel Management in WLANs
Abstract — Wireless frequency resources are often the limiting factor for WLAN throughput. Hence, wireless channel management is needed to mitigate co-channel interference and im...
Yongqiang Liu, William Wu, Bo Wang, Tao He, Su Yi,...
IOR
2010
71views more  IOR 2010»
13 years 6 months ago
Stochastic Root Finding and Efficient Estimation of Convex Risk Measures
Reliable risk measurement is a key problem for financial institutions and regulatory authorities. The current industry standard Value-at-Risk has several deficiencies. Improved ri...
Jörn Dunkel, Stefan Weber
CPHYSICS
2010
135views more  CPHYSICS 2010»
13 years 8 months ago
An events based algorithm for distributing concurrent tasks on multi-core architectures
In this paper, a programming model is presented which enables scalable parallel performance on multi-core shared memory architectures. The model has been developed for application...
David W. Holmes, John R. Williams, Peter Tilke
OOPSLA
2000
Springer
14 years 11 days ago
Scalable propagation-based call graph construction algorithms
Propagation-based call graph construction algorithms have been studied intensively in the 1990s, and differ primarily in the number of sets that are used to approximate run-time v...
Frank Tip, Jens Palsberg