Sciweavers

2421 search results - page 190 / 485
» Message from the Co-Chairs
Sort
View
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
13 years 9 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
ISI
2007
Springer
13 years 9 months ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
CCE
2005
13 years 9 months ago
Use of parallel computers in rational design of redundant sensor networks
A general method to design optimal redundant sensor network even in the case of one sensor failure and able to estimate process key parameters within a required accuracy is propos...
Carine Gerkens, Georges Heyen
JNW
2007
135views more  JNW 2007»
13 years 9 months ago
Access Control in Decentralised Publish/Subscribe Systems
Abstract— Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
TWC
2008
127views more  TWC 2008»
13 years 9 months ago
Distributed beamforming and power allocation for cooperative networks
Cooperative diversity systems rely on using relay nodes to relay copies of transmitted information to the destination such that each copy experiences different channel fading, henc...
Zhiguo Ding, Woon Hau Chin, Kin K. Leung