Sciweavers

1084 search results - page 114 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
INFFUS
2010
121views more  INFFUS 2010»
15 years 2 months ago
The statistical mechanics of belief sharing in multi-agent systems
- Many exciting, emerging applications require that a group of agents share a coherent view of the world given spatial distribution, incomplete and uncertain sensors, and communica...
Robin Glinton, Katia P. Sycara, David Scerri, Paul...
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
CAMAD
2006
IEEE
15 years 7 months ago
P2PRealm - peer-to-peer network simulator
Abstract--Peer-to-Peer Realm (P2PRealm) is an efficient peer-topeer network simulator for studying algorithms based on neural networks. In contrast to many simulators, which emphas...
Niko Kotilainen, Mikko Vapa, Teemu Keltanen, Annem...
INFOCOM
2010
IEEE
15 years 2 months ago
Capacity Region of a Wireless Mesh Backhaul Network over the CSMA/CA MAC
—This paper studies the maximum throughput that can be supported by a given wireless mesh backhaul network, over a practical CSMA/CA medium access control (MAC) protocol. We reso...
Yu Cheng, Hongkun Li, Peng-Jun Wan, Xinbing Wang
ASPDAC
2008
ACM
135views Hardware» more  ASPDAC 2008»
15 years 6 months ago
Temperature-aware MPSoC scheduling for reducing hot spots and gradients
Thermal hot spots and temperature gradients on the die need to be minimized to manufacture reliable systems while meeting energy and performance constraints. In this work, we solve...
Ayse Kivilcim Coskun, Tajana Simunic Rosing, Keith...