Sciweavers

1777 search results - page 241 / 356
» Programming Cryptographic Protocols
Sort
View
CCGRID
2003
IEEE
14 years 2 months ago
A-peer: An Agent Platform Integrating Peer-to-Peer Network
Peer-to-Peer (p2p), as an emerging technology, is exerting huge influence on various application scenarios. Meanwhile, agents, assisting applications in traditional paradigm with...
Tieyan Li, Zhi-Gang Zhao, Si-Zhen Yo
UIST
2003
ACM
14 years 2 months ago
Stylus input and editing without prior selection of mode
This paper offers a solution to the mode problem in computer sketch/notetaking programs. Conventionally, the user must specify the intended "draw" or "command"...
Eric Saund, Edward Lank
ICALP
2003
Springer
14 years 2 months ago
A Direct Sum Theorem in Communication Complexity via Message Compression
We prove lower bounds for the direct sum problem for two-party bounded error randomised multipleround communication protocols. Our proofs use the notion of information cost of a p...
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen
IFIP
2003
Springer
14 years 2 months ago
Dynamic Device Access for Mobile Users
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Dirk Kutscher, Jörg Ott
IFIP
2003
Springer
14 years 2 months ago
A Rotational Sector-Based, Receiver-Oriented Mechanism for Location Tracking and Medium Access Control in Ad Hoc Networks Using
The use of directional antenna in wireless ad hoc networks potentially increases simultaneous communication by directing the transmitting and receiving beams towards the receiver a...
Tetsuro Ueda, Shinsuke Tanaka, Dola Saha, Siuli Ro...