Sciweavers

13180 search results - page 2630 / 2636
» Network Models
Sort
View
ASIACRYPT
2010
Springer
13 years 5 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
CCCG
2010
13 years 5 months ago
Determining the robustness of sensor barriers
Various notions of coverage provided by wireless sensor networks have attracted considerable attention over the past few years. In general, coverage can be expressed geometrically...
David G. Kirkpatrick
GLOBECOM
2010
IEEE
13 years 5 months ago
Unveiling Popularity of BitTorrent Darknets
BitTorrent is today's most influential peer-to-peer system. Currently BitTorrent has two very different operating models: (1) public trackers, and (2) private trackers (also k...
Xiaowei Chen, Xiaowen Chu, Jiangchuan Liu
ISW
2010
Springer
13 years 5 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
ICCAD
2009
IEEE
89views Hardware» more  ICCAD 2009»
13 years 5 months ago
Decoupling capacitance efficient placement for reducing transient power supply noise
Decoupling capacitance (decap) is an efficient way to reduce transient noise in on-chip power supply networks. However, excessive decap may cause more leakage power, chip resource...
Xiaoyi Wang, Yici Cai, Qiang Zhou, Sheldon X.-D. T...
« Prev « First page 2630 / 2636 Last » Next »