Sciweavers

5891 search results - page 209 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
MOBIHOC
2001
ACM
16 years 4 months ago
Distributed assignment of encoded MAC addresses in sensor networks
In wireless sensor networks, the vast majority of wide-scale traffic consists of only a few bytes, including all network and application layer IDs. Therefore, MAC addresses, which...
Curt Schurgers, Gautam Kulkarni, Mani B. Srivastav...
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
16 years 5 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
PDP
2011
IEEE
14 years 8 months ago
Accelerating Parameter Sweep Applications Using CUDA
—This paper proposes a parallelization scheme for parameter sweep (PS) applications using the compute unified device architecture (CUDA). Our scheme focuses on PS applications w...
Masaya Motokubota, Fumihiko Ino, Kenichi Hagihara
ICRA
2006
IEEE
87views Robotics» more  ICRA 2006»
15 years 10 months ago
Motion Duplication Control for Distributed Dynamic Systems by Natural Damping
— This paper proposes a motion duplication control scheme, which not only synchronizes motions between two distributed separate dynamic systems but also perfectly preserves presc...
Joono Cheong, Seungjin Lee, Jung Kim
IPPS
2009
IEEE
15 years 11 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen