Sciweavers

404 search results - page 71 / 81
» Robust Multiparty Computation with Linear Communication Comp...
Sort
View
VTC
2006
IEEE
160views Communications» more  VTC 2006»
14 years 1 months ago
Chip-interleaved Multi-rate CDMA with 2-dimensional OVSF Spreading
—Chip interleaving technique has been proposed for DS-CDMA to eliminate the multiple-access interference (MAI). In this paper, we develop this technique to provide the single- or...
Le Liu, Fumiyuki Adachi
CCR
2008
77views more  CCR 2008»
13 years 7 months ago
What would Darwin think about clean-slate architectures?
As significant resources are directed towards clean-slate networking research, it is imperative to understand how cleanslate architectural research compares to the diametrically o...
Constantine Dovrolis
IADIS
2003
13 years 9 months ago
Informatization and E-Business Model Application for Distributed Data Mining Using Mobile Agents
Distributed data mining (DDM) is the semi-automatic pattern extraction of distributed data sources. The next generation of the data mining studies will be distributed data mining ...
Ezendu Ifeanyi Ariwa, Mohamed B. Senousy, Mohamed ...
STOC
2001
ACM
104views Algorithms» more  STOC 2001»
14 years 8 months ago
Spatial gossip and resource location protocols
The dynamic behavior of a network in which information is changing continuously over time requires robust and efficient mechanisms for keeping nodes updated about new information. ...
David Kempe, Jon M. Kleinberg, Alan J. Demers
IJSN
2006
140views more  IJSN 2006»
13 years 7 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi