Sciweavers

1559 search results - page 311 / 312
» A Neural Network Model of a Communication Network with Infor...
Sort
View
CCS
2008
ACM
13 years 7 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
ATAL
2010
Springer
13 years 6 months ago
Distributed multiagent learning with a broadcast adaptive subgradient method
Many applications in multiagent learning are essentially convex optimization problems in which agents have only limited communication and partial information about the function be...
Renato L. G. Cavalcante, Alex Rogers, Nicholas R. ...
MOBILITY
2009
ACM
14 years 1 days ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...
ICMCS
2006
IEEE
179views Multimedia» more  ICMCS 2006»
13 years 11 months ago
Optimizing Algorithms for Region-of-Interest Video Compression, with Application to Mobile Telehealth
Wireless communication of video poses constraints on information capacity. Region-of-Interest (ROI) video coding provides higher quality in the ROI, but poorer quality in the back...
Sira Rao, Nikil Jayant
IPCCC
2006
IEEE
13 years 11 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau