Sciweavers

380 search results - page 48 / 76
» Exonovation - Leveraging the Innovation of Others
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
Power-Adjusted Random Access to a Wireless Channel
—The operation of widely-deployed random access to wireless networks is based on limited information on the result of each access attempt. When making a random access attempt, us...
Young-June Choi, Kang G. Shin
INFOCOM
2008
IEEE
14 years 3 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino
FOCS
2007
IEEE
14 years 3 months ago
Covert Multi-Party Computation
In STOC’05, Ahn, Hopper and Langford introduced the notion of covert computation. A covert computation protocol is one in which parties can run a protocol without knowing if oth...
Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, ...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 3 months ago
Detecting SPIT Calls by Checking Human Communication Patterns
— SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot ...
Jürgen Quittek, Saverio Niccolini, Sandra Tar...
ICPPW
2007
IEEE
14 years 3 months ago
Power Management of Multicore Multiple Voltage Embedded Systems by Task Scheduling
We study the role of task-level scheduling in power management on multicore multiple voltage embedded systems. Multicore on-achip, in particular DSP systems, can greatly improve p...
Gang Qu