Sciweavers

978 search results - page 149 / 196
» Some neural networks compute, others don't
Sort
View
EUROCRYPT
2007
Springer
14 years 1 months ago
Feistel Networks Made Public, and Applications
Feistel Network, consisting of a repeated application of the Feistel Transform, gives a very convenient and popular method for designing “cryptographically strong” permutations...
Yevgeniy Dodis, Prashant Puniya
WPES
2006
ACM
14 years 1 months ago
Measuring relationship anonymity in mix networks
Many applications of mix networks such as anonymous Web browsing require relationship anonymity: it should be hard for the attacker to determine who is communicating with whom. Co...
Vitaly Shmatikov, Ming-Hsiu Wang
MOBICOM
2005
ACM
14 years 1 months ago
PeopleNet: engineering a wireless virtual social network
People often seek information by asking other people even when they have access to vast reservoirs of information such as the Internet and libraries. This is because people are gr...
Mehul Motani, Vikram Srinivasan, Pavan Nuggehalli
LCN
2006
IEEE
14 years 1 months ago
On Access Point Selection in IEEE 802.11 Wireless Local Area Networks
In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select “best...
Murad Abusubaih, James Gross, Sven Wiethölter...
MP
2010
119views more  MP 2010»
13 years 6 months ago
Efficient and fair routing for mesh networks
Inspired by the One Laptop Per Child project, we consider mesh networks that connect devices that cannot recharge their batteries easily. We study how the mesh should retransmit in...
Andrea Lodi, Enrico Malaguti, Nicolás E. St...