Sciweavers

1368 search results - page 205 / 274
» Modeling the Telephone Call Network
Sort
View
PERCOM
2004
ACM
14 years 9 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
INFOCOM
2009
IEEE
14 years 4 months ago
Tuning Skype's Redundancy Control Algorithm for User Satisfaction
—Determining how to transport delay-sensitive voice data has long been a problem in multimedia networking. The difficulty arises because voice and best-effort data are different...
Te-Yuan Huang, Kuan-Ta Chen, Polly Huang
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 4 months ago
On the WiMAX and HSDPA Coexistence
— In this work we develop Markovian models to study the dynamics of elastic calls in a cell served by HSDPA and WiMAX systems. We first present analytical models for interferenc...
Luca Sartori, Salah-Eddine Elayoubi, Benoît ...
BMCBI
2010
123views more  BMCBI 2010»
13 years 10 months ago
Computationally efficient flux variability analysis
Background: Flux variability analysis is often used to determine robustness of metabolic models in various simulation conditions. However, its use has been somehow limited by the ...
Steinn Gudmundsson, Ines Thiele
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
13 years 7 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith