Sciweavers

21520 search results - page 3 / 4304
» Symmetric network computation
Sort
View
COMPSYSTECH
2010
13 years 8 months ago
An approach for node identification and key management in sensor grids
Security of sensor grids is important especially for surveillance, military and medical applications. The paper addresses methods for two security features. First, an approach for ...
Iliya Georgiev
GI
2004
Springer
14 years 1 months ago
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks
: Ad hoc networking with Bluetooth requires an efficient way of discovering neighbor devices. Based on real-world measurements and simulations we are deriving optimal parameters f...
Diego Bohman, Matthias Frank, Peter Martini, Chris...
JSC
2011
110views more  JSC 2011»
13 years 2 months ago
Computing symmetric rank for symmetric tensors
We consider the problem of determining the symmetric tensor rank for symmetric tensors with an algebraic geometry approach. We give algorithms for computing the symmetric rank for...
Alessandra Bernardi, Alessandro Gimigliano, Monica...
GI
2004
Springer
14 years 1 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
PDP
2009
IEEE
14 years 2 months ago
Phoenix: A Runtime Environment for High Performance Computing on Chip Multiprocessors
Abstract—Execution of applications on upcoming highperformance computing (HPC) systems introduces a variety of new challenges and amplifies many existing ones. These systems will...
Avneesh Pant, Hassan Jafri, Volodymyr V. Kindraten...