Sciweavers

620 search results - page 101 / 124
» The computational power of population protocols
Sort
View
SASN
2004
ACM
14 years 6 days ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson
EUROCRYPT
2004
Springer
14 years 4 days ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
SIGMOD
2007
ACM
106views Database» more  SIGMOD 2007»
14 years 7 months ago
Highly distributed XQuery with DXQ
Many modern applications, from Grid computing to RSS handling, need to support data processing in a distributed environment. Currently, most such applications are implemented usin...
Jérôme Siméon, Kristi Morton, ...
CSE
2009
IEEE
14 years 1 months ago
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans
—Modern consumer wireless devices are increasingly powerful, making them attractive to use as wireless sensor nodes. At the same time, many use protocol suites such as Bluetooth ...
David Evans, Robert H. Warren
ICDCS
2008
IEEE
14 years 1 months ago
Weak vs. Self vs. Probabilistic Stabilization
Self-stabilization is a strong property which guarantees that a network always resume a correct behavior starting from an arbitrary initial state. Weaker guarantees have later bee...
Stéphane Devismes, Sébastien Tixeuil...