Sciweavers

1063 search results - page 68 / 213
» Infrastructure Leasing Problems
Sort
View
SCN
2008
Springer
13 years 8 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...
PUC
2007
117views more  PUC 2007»
13 years 8 months ago
GETA sandals: a footstep location tracking system
Abstract This paper presents the design, implementation, and evaluation of a footstep based indoor location system. The traditional Japanese GETA sandals are equipped with force, u...
Shun-yuan Yeh, Keng-hao Chang, Chon-in Wu, Hao-Hua...
TSE
2011
114views more  TSE 2011»
13 years 3 months ago
Loupe: Verifying Publish-Subscribe Architectures with a Magnifying Lens
Abstract— The Publish-Subscribe (P/S) communication paradigm fosters high decoupling among distributed components. This facilitates the design of dynamic applications, but also i...
Luciano Baresi, Carlo Ghezzi, Luca Mottola
TON
2012
11 years 11 months ago
Taming the Mobile Data Deluge With Drop Zones
—Human communication has changed by the advent of smartphones. Using commonplace mobile device features they started uploading large amounts of content that increases. This incre...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
STOC
2002
ACM
159views Algorithms» more  STOC 2002»
14 years 9 months ago
On the composition of authenticated byzantine agreement
A fundamental problem of distributed computing is that of simulating a secure broadcast channel, within the setting of a point-to-point network. This problem is known as Byzantine...
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin