Sciweavers

5615 search results - page 1101 / 1123
» On the Computational Capabilities of Several Models
Sort
View
WWW
2002
ACM
14 years 8 months ago
Clustering for opportunistic communication
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. U...
Jay Budzik, Shannon Bradshaw, Xiaobin Fu, Kristian...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 8 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
EWSN
2009
Springer
14 years 8 months ago
Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks
As many radio chips used in today's sensor mote hardware can work at different frequencies, several multi-channel communication protocols have recently been proposed to improv...
Xiaodong Wang, Xiaorui Wang, Xing Fu, Guoliang Xin...
VLSID
2001
IEEE
200views VLSI» more  VLSID 2001»
14 years 8 months ago
Evaluation of the Traffic-Performance Characteristics of System-on-Chip Communication Architectures
The emergence of several communication architectures for System-on-Chips provides designers with a variety of design alternatives. In addition, the need to customize the system ar...
Kanishka Lahiri, Sujit Dey, Anand Raghunathan
STOC
2004
ACM
121views Algorithms» more  STOC 2004»
14 years 7 months ago
Lower bounds for dynamic connectivity
We prove an (lg n) cell-probe lower bound on maintaining connectivity in dynamic graphs, as well as a more general trade-off between updates and queries. Our bound holds even if t...
Mihai Patrascu, Erik D. Demaine
« Prev « First page 1101 / 1123 Last » Next »