Sciweavers

30 search results - page 5 / 6
» The Surprising Power of Epidemic Communication
Sort
View
ICT
2004
Springer
130views Communications» more  ICT 2004»
14 years 26 days ago
Rayleigh Fading Multiple Access Channel Without Channel State Information
— In this paper we determine bounds of the capacity region of a two-user multipleaccess channel with Rayleigh fading when neither the transmitters nor the receiver has channel st...
Ninoslav Marina
INFOCOM
2010
IEEE
13 years 6 months ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
SPAA
1995
ACM
13 years 11 months ago
Parallel Sorting with Limited Bandwidth
We study the problem of sorting on a parallel computer with limited communication bandwidth. By using the PRAM(m) model, where p processors communicate through a globally shared me...
Micah Adler, John W. Byers, Richard M. Karp
SUTC
2006
IEEE
14 years 1 months ago
Sensor Networks for Everyday Use: The BL-Live Experience
With 250,000 NTD invested, 6 man power allocated, and 9 month time elapsed, we present BLLive. The seemingly dumb, senseless BL Hall at National Taiwan University is transformed t...
Seng-Yong Lau, Ting-Hao Chang, Shu-Yu Hu, Hsing-Ju...
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis