Sciweavers

6224 search results - page 1098 / 1245
» Recent Advances in Networking
Sort
View
CCS
2009
ACM
15 years 10 months ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...
CLUSTER
2009
IEEE
15 years 10 months ago
Granules: A lightweight, streaming runtime for cloud computing with support, for Map-Reduce
— Cloud computing has gained significant traction in recent years. The Map-Reduce framework is currently the most dominant programming model in cloud computing settings. In this ...
Shrideep Pallickara, Jaliya Ekanayake, Geoffrey Fo...
138
Voted
DATE
2009
IEEE
110views Hardware» more  DATE 2009»
15 years 10 months ago
Light NUCA: A proposal for bridging the inter-cache latency gap
Abstract—To deal with the “memory wall” problem, microprocessors include large secondary on-chip caches. But as these caches enlarge, they originate a new latency gap between...
Darío Suárez Gracia, Teresa Monreal,...
GLOBECOM
2009
IEEE
15 years 10 months ago
Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
Abstract—Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied ...
Yongle Wu, Beibei Wang, K. J. Ray Liu
123
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Distributed Physical Carrier Sensing Adaptation Scheme in Cooperative MAP WLAN
Abstract— Recently a multiple access point (MAP) architecture is proposed for wireless local area networks (WLAN) to exploit the spatial diversity by permitting each user to asso...
Yao Hua, Qian Zhang, Zhisheng Niu
« Prev « First page 1098 / 1245 Last » Next »