Sciweavers

1058 search results - page 151 / 212
» It's Doomed; We Can Prove It
Sort
View
COCOON
2005
Springer
14 years 3 months ago
Min-Energy Voltage Allocation for Tree-Structured Tasks
Westudyjobschedulingonprocessorscapableofrunningatvariablevoltage/speed tominimizeenergyconsumption.Eachjob ina probleminstanceisspecifiedbyitsarrivaltime and deadline, together w...
Minming Li, Becky Jie Liu, Frances F. Yao
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 3 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
INFOCOM
2003
IEEE
14 years 3 months ago
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
— Mobile ad hoc networking has been an active research area for several years. How to stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In th...
Sheng Zhong, Jiang Chen, Yang Richard Yang
EPIA
2003
Springer
14 years 3 months ago
Evolutionary Neuroestimation of Fitness Functions
Abstract. One of the most influential factors in the quality of the solutions found by an evolutionary algorithm is the appropriateness of the fitness function. Specifically in ...
Jesús S. Aguilar-Ruiz, Daniel Mateos, Domin...
INFOCOM
2002
IEEE
14 years 2 months ago
Equation-Based Packet Marking for Assured Forwarding Services
Abstract— This paper introduces a new packet marking algorithm that can be used in the context of Assured Forwarding (AF) in the Differentiated Services (DiffServ) framework [1],...
Mohamed A. El-Gendy, Kang G. Shin