Sciweavers

2938 search results - page 587 / 588
» On obfuscating point functions
Sort
View
ICDE
2012
IEEE
241views Database» more  ICDE 2012»
11 years 10 months ago
GeoFeed: A Location Aware News Feed System
Abstract—This paper presents the GeoFeed system; a locationaware news feed system that provides a new platform for its users to get spatially related message updates from either ...
Jie Bao 0003, Mohamed F. Mokbel, Chi-Yin Chow
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
TON
2012
11 years 10 months ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
COMPGEOM
2004
ACM
14 years 1 months ago
On locally Delaunay geometric graphs
A geometric graph is a simple graph G = (V, E) with an embedding of the set V in the plane such that the points that represent V are in general position. A geometric graph is said...
Rom Pinchasi, Shakhar Smorodinsky
GI
2004
Springer
14 years 1 months ago
Distributed Job Scheduling in a Peer-to-Peer Video Recording System
: Since the advent of Gnutella, Peer-to-Peer (P2P) protocols have matured towards a fundamental design element for large-scale, self-organising distributed systems. Many research e...
Curt Cramer, Kendy Kutzner, Thomas Fuhrmann