Sciweavers

19003 search results - page 83 / 3801
» We Need Assurance!
Sort
View
FC
2003
Springer
101views Cryptology» more  FC 2003»
14 years 1 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
MOBIDE
1999
ACM
14 years 6 days ago
Recovery Guarantees in Mobile Systems
Mobile applications increasingly require transaction-like properties, particularly those of recovery. Because there is a lack of abstractions to decompose the machinery of recover...
Cris Pedregal Martin, Krithi Ramamritham
WETICE
1999
IEEE
14 years 4 days ago
Here Is the Knowledge-Where Should I Put It?
In order to design useful knowledge media spaces to knowledge workers it is essential that we understand the nature of the work conducted and the knowledge applied in real setting...
Peter H. Carstensen, Ulrika Snis
GLOBECOM
2009
IEEE
13 years 11 months ago
Optimum Allocation of Energy and Spectrum in Power-Controlled Wireless Networks with QoS Constraints
An important performance measure in wireless networks is the manner in which the network can distributively manage its limited energy and spectrum resources, while assuring certain...
Stepán Kucera, Ludek Kucera, Bing Zhang
PAM
2010
Springer
13 years 9 months ago
Influence of the Packet Size on the One-Way Delay in 3G Networks
We currently observe a rising interest in mobile broadband, which users expect to perform in a similar way as its fixed counterpart. On the other hand, the capacity allocation proc...
Patrik Arlos, Markus Fiedler