Sciweavers

673 search results - page 131 / 135
» Who's asking for help
Sort
View
ENTCS
2006
134views more  ENTCS 2006»
13 years 9 months ago
Anonymity in Probabilistic and Nondeterministic Systems
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi
IJDSN
2006
132views more  IJDSN 2006»
13 years 9 months ago
Using Misbehavior to Analyze Strategic versus Aggregate Energy Minimization in Wireless Sensor Networks
Abstract-- We present a novel formulation of the problem of energy misbehavior and develop an analytical framework for quantifying its impact on other nodes. Specifically, we formu...
Rajgopal Kannan, Shuangqing Wei, Vasu Chakravarthy...
JOT
2008
72views more  JOT 2008»
13 years 9 months ago
Fixing Apples' Broken Clipboard, with Java
The Mac OS X clipboard is infamous for changing the format of bit-mapped images that are pasted to it. These images are typically encoded using a QuickTime Tiff compressor that re...
Douglas A. Lyon
JDFP
2006
139views more  JDFP 2006»
13 years 9 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
ECCC
2007
86views more  ECCC 2007»
13 years 9 months ago
Interactive PCP
A central line of research in the area of PCPs is devoted to constructing short PCPs. In this paper, we show that if we allow an additional interactive verification phase, with v...
Yael Tauman Kalai, Ran Raz