Sciweavers

418 search results - page 73 / 84
» Source Controlled Modulation Scheme for Sources with Memory
Sort
View
ASIACRYPT
2005
Springer
14 years 1 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...
INFOCOM
2003
IEEE
14 years 1 months ago
On-demand Power Management for Ad Hoc Networks
— Battery power is an important resource in ad hoc networks. It has been observed that in ad hoc networks, energy consumption does not reflect the communication activities in th...
Rong Zheng, Robin Kravets
ISCC
2003
IEEE
122views Communications» more  ISCC 2003»
14 years 1 months ago
AMCA: an Active-based Multicast Congestion Avoidance Algorithm
Many works have recently addressed the issue of congestion control for multicast communications and the problem is known to be highly complex. Scalability, responsiveness, stabili...
Moufida Maimour, CongDuc Pham
DBISP2P
2003
Springer
92views Database» more  DBISP2P 2003»
14 years 1 months ago
Semantic Overlay Clusters within Super-Peer Networks
When joining information provider peers to a peer-to-peer network, an arbitrary distribution is sub-optimal. In fact, clustering peers by their characteristics, enhances search and...
Alexander Löser, Felix Naumann, Wolf Siberski...
FMCO
2003
Springer
114views Formal Methods» more  FMCO 2003»
14 years 1 months ago
Synchronous Closing and Flow Analysis for Model Checking Timed Systems
Abstract. Formal methods, in particular model checking, are increasingly accepted as integral part of system development. With large software systems beyond the range of fully auto...
Natalia Ioustinova, Natalia Sidorova, Martin Steff...