Sciweavers

648 search results - page 88 / 130
» Lowness for Demuth Randomness
Sort
View
WAW
2007
Springer
157views Algorithms» more  WAW 2007»
14 years 5 months ago
Stochastic Kronecker Graphs
A random graph model based on Kronecker products of probability matrices has been recently proposed as a generative model for large-scale real-world networks such as the web. This...
Mohammad Mahdian, Ying Xu 0002
GLOBECOM
2006
IEEE
14 years 5 months ago
Distributed Formation of Overlapping Multi-hop Clusters in Wireless Sensor Networks
– Clustering is a standard approach for achieving efficient and scalable performance in wireless sensor networks. Most of the published clustering algorithms strive to generate t...
Adel M. Youssef, Mohamed F. Younis, Moustafa Youss...
IPPS
2006
IEEE
14 years 5 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
NCA
2006
IEEE
14 years 5 months ago
JetStream: Achieving Predictable Gossip Dissemination by Leveraging Social Network Principles
Gossip protocols provide probabilistic reliability and scalability, but their inherent randomness may lead to high variation in number of messages that are received at different n...
Jay A. Patel, Indranil Gupta, Noshir S. Contractor
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 5 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall