Sciweavers

648 search results - page 102 / 130
» The GCHQ Protocol and Its Problems
Sort
View
ACL
1998
13 years 10 months ago
Methods and Practical Issues in Evaluating Alignment Techniques
This paper describes the work achieved in the rst half of a 4-year cooperative research project ARCADE, nanced by AUPELF-UREF. The project is devoted to the evaluation of parallel...
Philippe Langlais, Michel Simard, Jean Véro...
COMCOM
2006
123views more  COMCOM 2006»
13 years 8 months ago
Modeling the performance of flooding in wireless multi-hop Ad hoc networks
One feature common to most existing routing protocols for wireless mobile ad hoc networks, or MANETs, is the need to flood control messages network-wide during the route acquisiti...
Kumar Viswanath, Katia Obraczka
CORR
2006
Springer
100views Education» more  CORR 2006»
13 years 8 months ago
Capacity of Cooperative Fusion in the Presence of Byzantine Sensors
Abstract-- The problem of cooperative fusion in the presence of both Byzantine sensors and misinformed sensors is considered. An information theoretic formulation is used to charac...
Oliver Kosut, Lang Tong
ESORICS
2006
Springer
14 years 15 days ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
DSD
2009
IEEE
136views Hardware» more  DSD 2009»
14 years 21 days ago
An Evaluation of Behaviors of S-NUCA CMPs Running Scientific Workload
Modern systems are able to put two or more processors on the same die (Chip Multiprocessors, CMP), each with its private caches, while the last level caches can be either private ...
Pierfrancesco Foglia, Francesco Panicucci, Cosimo ...