Sciweavers

1017 search results - page 122 / 204
» On the Power of k -Consistency
Sort
View
TMC
2010
138views more  TMC 2010»
13 years 8 months ago
Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks
—One important application of cooperative communications is to extend coverage area in wireless networks without increasing infrastructure. However, a crucial challenge in implem...
Ahmed K. Sadek, Zhu Han, K. J. Ray Liu
ICETET
2009
IEEE
13 years 7 months ago
Development of HCNG Blended Fuel Engine with Control of NOx Emissions
With increasing concern about energy shortage and environmental protection, research on reducing exhaust emissions, reducing fuel consumption, reducing engine noise and increasing...
K. R. Patil, P. M. Khanwalkar, S. S. Thipse, K. P....
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 10 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
NSPW
2006
ACM
14 years 4 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
CCS
2001
ACM
14 years 1 months ago
A verifiable secret shuffle and its application to e-voting
We present a mathematical construct which provides a cryptographic protocol to verifiably shuffle a sequence of k modular integers, and discuss its application to secure, universa...
C. Andrew Neff