Sciweavers

266 search results - page 49 / 54
» Evaluating the Impact of Limited Resource on the Performance...
Sort
View
CCS
2006
ACM
13 years 11 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
ICC
2007
IEEE
102views Communications» more  ICC 2007»
14 years 1 months ago
Power Allocation in Multi-Carrier Networks with Unicast and Multicast Services
—Since the provision of both unicast and multicast services is expected for the next generation of multi-carrier wireless systems, the allocation of resources for this combinatio...
Yuri C. B. Silva, Anja Klein
ATAL
2005
Springer
14 years 1 months ago
Agent-organized networks for dynamic team formation
Many multi-agent systems consist of a complex network of autonomous yet interdependent agents. Examples of such networked multi-agent systems include supply chains and sensor netw...
Matthew E. Gaston, Marie desJardins
PERCOM
2004
ACM
14 years 7 months ago
Ontology Based Context Modeling and Reasoning using OWL
In this paper we propose an OWL encoded context ontology (CONON) for modeling context in pervasive computing environments, and for supporting logicbased context reasoning. CONON p...
Xiaohang Wang, Daqing Zhang, Tao Gu, Hung Keng Pun...
PE
2002
Springer
158views Optimization» more  PE 2002»
13 years 7 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...