Sciweavers

2421 search results - page 92 / 485
» Message from the Co-Chairs
Sort
View
ADHOC
2008
132views more  ADHOC 2008»
13 years 8 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
JASIS
2011
98views more  JASIS 2011»
13 years 2 months ago
Hip and trendy: Characterizing emerging trends on Twitter
Twitter, Facebook, and other related systems that we call social awareness streams are rapidly changing the information and communication dynamics of our society. These systems, w...
Mor Naaman, Hila Becker, Luis Gravano
TIT
2010
129views Education» more  TIT 2010»
13 years 2 months ago
Two-way source coding with a helper
Consider the two-way rate-distortion problem in which a helper sends a common limited-rate message to both users based on side information at its disposal. We characterize the reg...
Haim H. Permuter, Yossef Steinberg, Tsachy Weissma...
PVM
2007
Springer
14 years 2 months ago
(Sync|Async)+ MPI Search Engines
We propose a parallel MPI search engine that is capable of automatically switching between asynchronous message passing and bulk-synchronous message passing modes of operation. Whe...
Mauricio Marín, Veronica Gil Costa
ACSAC
2002
IEEE
14 years 27 days ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford