Sciweavers

2702 search results - page 457 / 541
» Message from the Editor
Sort
View
TWC
2008
147views more  TWC 2008»
15 years 3 months ago
Asymmetric cooperation among wireless relays with linear precoding
Wireless relays extend coverage, improve spectral efciency, and enhance reliability and rates of wireless cellular communication systems. In this work, we introduce the fundamental...
Natasha Devroye, Neelesh B. Mehta, Andreas F. Moli...
CI
2004
76views more  CI 2004»
15 years 3 months ago
Negotiating Exchanges of P3p-Labeled Information for Compensation
We consider private information a commodity, of value to both the information holder and the information seeker. Hence, a customer can be enticed to trade his/her private informati...
Scott Buffett, Keping Jia, Sandy Liu, Bruce Spence...
129
Voted
ADHOC
2007
134views more  ADHOC 2007»
15 years 3 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
151
Voted
CLUSTER
2002
IEEE
15 years 3 months ago
Open Metadata Formats: Efficient XML-Based Communication for High Performance Computing
High-performance computing faces considerable change as the Internet and the Grid mature. Applications that once were tightly-coupled and monolithic are now decentralized, with co...
Patrick Widener, Greg Eisenhauer, Karsten Schwan, ...
100
Voted
ENTCS
2002
89views more  ENTCS 2002»
15 years 3 months ago
ZEUS: A Distributed Timed Model-Checker Based on KRONOS
In this work we present Zeus, a Distributed Model-Checker that evolves from the tool Kronos [8] and that currently can handle backwards computation of TCTLreachability properties ...
Víctor A. Braberman, Alfredo Olivero, Ferna...