Sciweavers

358 search results - page 9 / 72
» Protocols from perceptual observations
Sort
View
ASIACRYPT
2009
Springer
14 years 2 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
EWSN
2009
Springer
14 years 8 months ago
Multi-hop Cluster Hierarchy Maintenance in Wireless Sensor Networks: A Case for Gossip-Based Protocols
Multi-hop cluster hierarchy has been presented as an organization for large wireless sensor networks (WSNs) that can provide scalable routing, data aggregation, and querying. In th...
Konrad Iwanicki, Maarten van Steen

Publication
253views
13 years 5 months ago
Multisensory Oddity Detection as Bayesian Inference
A key goal for the perceptual system is to optimally combine information from all the senses that may be available in order to develop the most accurate and unified picture possi...
Timothy Hospedales and Sethu Vijayakumar
ARESEC
2011
104views more  ARESEC 2011»
12 years 7 months ago
An Inductive Approach to Provable Anonymity
—We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et al. Our formalization relies on inductive definitions of message distinguish ability and...
Yongjian Li, Jun Pang
CCR
2008
90views more  CCR 2008»
13 years 7 months ago
Censor networks: a critique of "sensor networks" from a systems perspective
This writeup presents a critique of the field of "Wireless Sensor Networks (WSNs)". Literature in this domain falls into two main, distinct categories: (1) algorithms or...
Bhaskaran Raman, Kameswari Chebrolu