Sciweavers

1816 search results - page 271 / 364
» Trace oblivious computation
Sort
View
IFIPTCS
2010
13 years 6 months ago
Safe Equivalences for Security Properties
Abstract. In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference)...
Mário S. Alvim, Miguel E. Andrés, Ca...
MOBIHOC
2010
ACM
13 years 6 months ago
Globs in the primordial soup: the emergence of connected crowds in mobile wireless networks
In many practical scenarios, nodes gathering at points of interest yield sizable connected components (clusters), which sometimes comprise the majority of nodes. While recent anal...
Simon Heimlicher, Kavé Salamatian
TGC
2010
Springer
13 years 6 months ago
Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Processes
Rate transition systems (RTS) are a special kind of transition systems introduced for defining the stochastic behavior of processes and for associating continuous-time Markov chain...
Marco Bernardo, Rocco De Nicola, Michele Loreti
WEBI
2010
Springer
13 years 6 months ago
Exploiting Puzzle Diversity in Puzzle Selection for ESP-Like GWAP Systems
The ESP game belongs to the genre called Games with a Purpose (GWAP), which leverage people's desire to be entertained and also outsource certain steps of the computational p...
Yu-Song Syu, Hsiao-Hsuan Yu, Ling-Jyh Chen
WICON
2010
13 years 6 months ago
On Infostation Density of Vehicular Networks
Vehicle-to-Vehicle and Vehicle-to-Roadside communications are going to become an indispensable part of the modern day automotive experience. For people on the move, vehicular netwo...
Vinod Kone, Haitao Zheng, Antony I. T. Rowstron, B...