Sciweavers

5687 search results - page 898 / 1138
» Visualizing Evaluation in Scheme
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
CTU: Capturing Throughput Dependencies in UWB Networks
—The inherent channel characteristics of impulse-based UWB networks affect the MAC layer performance significantly. Previous studies on evaluating MAC protocols are based on pro...
Ioannis Broustis, Aggelos Vlavianos, Prashant Kris...
ACCESSNETS
2008
Springer
15 years 10 months ago
A Simulator of Periodically Switching Channels for Power Line Communications
An indoor power line is one of the most attractive media for in-home networks. However, there are many technical problems for achieving in-home power line communication (PLC) with ...
Taro Hayasaki, Daisuke Umehara, Satoshi Denno, Mas...
156
Voted
CCS
2007
ACM
15 years 10 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
154
Voted
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
15 years 10 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
CLEF
2005
Springer
15 years 9 months ago
Thomson Legal and Regulatory Experiments at CLEF-2005
For the 2005 Cross-Language Evaluation Forum, Thomson Legal and Regulatory participated in the Hungarian, French, and Portuguese monolingual search tasks as well as French-to-Port...
Isabelle Moulinier, Ken Williams