Sciweavers

3405 search results - page 642 / 681
» Factoring Groups Efficiently
Sort
View
152
Voted
TKDE
2010
195views more  TKDE 2010»
15 years 1 months ago
Query Processing Using Distance Oracles for Spatial Networks
—The popularity of location-based services and the need to do real-time processing on them has led to an interest in performing queries on transportation networks, such as findin...
Jagan Sankaranarayanan, Hanan Samet
133
Voted
VTC
2010
IEEE
147views Communications» more  VTC 2010»
15 years 1 months ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
15 years 1 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
146
Voted
MOBIHOC
2010
ACM
15 years 1 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
170
Voted
GLOBECOM
2010
IEEE
15 years 26 days ago
A Controlled Coalitional Game for Wireless Connection Sharing and Bandwidth Allocation in Mobile Social Networks
Mobile social networks have been introduced as a new efficient (i.e., minimize resource usage) and effective (i.e., maximize the number of target recipients) way to disseminate con...
Dusit Niyato, Zhu Han, Walid Saad, Are Hjør...