Sciweavers

275 search results - page 23 / 55
» Group Communication Protocol for Autonomic Computing
Sort
View
CCS
2008
ACM
13 years 9 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
JSAC
2010
166views more  JSAC 2010»
13 years 6 months ago
Phero-trail: a bio-inspired location service for mobile underwater sensor networks
A SEA Swarm (Sensor Equipped Aquatic Swarm) moves as a group with water current and enables 4D (space and time) monitoring of local underwater events such as contaminants and intr...
Luiz Filipe M. Vieira, Uichin Lee, Mario Gerla
OPODIS
2007
13 years 9 months ago
A Decentralized, Scalable, and Autonomous Grid Monitoring System
Abstract. Grid monitoring systems collect a substantial amount of information on the infrastructure’s status in order to perform various tasks, more commonly to provide a better ...
Laurent Baduel, Satoshi Matsuoka
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
13 years 12 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
KI
2008
Springer
13 years 7 months ago
Autonomous Learning of User's Preferences Improved through User Feedback
Ambient Intelligent (AmI) environments are supposed to act proactively anticipating the user's needs and preferences, therefore the capability of an AmI system to learn those ...
Asier Aztiria, Juan Carlos Augusto, Alberto Izagui...