Sciweavers

17932 search results - page 3371 / 3587
» Wireless communications systems
Sort
View
144
Voted
IPPS
1999
IEEE
15 years 8 months ago
Portable Parallel Programming for the Dynamic Load Balancing of Unstructured Grid Applications
The ability to dynamically adapt an unstructured grid (or mesh) is a powerful tool for solving computational problems with evolving physical features; however, an efficient parall...
Rupak Biswas, Leonid Oliker, Sajal K. Das, Daniel ...
135
Voted
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 8 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
EUROCRYPT
1999
Springer
15 years 8 months ago
Conditional Oblivious Transfer and Timed-Release Encryption
Abstract. We consider the problem of sending messages into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anon...
Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramak...
143
Voted
SCCC
1999
IEEE
15 years 8 months ago
MetaFT-A Reflective Approach to Implement Replication Techniques in CORBA
A model was introduced in [Fraga97] for integrating replication techniques in heterogeneous systems. The model adopts a reflective structure based on the meta-object approach [10]...
Lau Cheuk Lung, Joni da Silva Fraga, Carlos Mazier...
122
Voted
FC
1999
Springer
160views Cryptology» more  FC 1999»
15 years 8 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
« Prev « First page 3371 / 3587 Last » Next »