Sciweavers

373 search results - page 3 / 75
» Abstract Geometrical Computation for Black Hole Computation
Sort
View
HPDC
1999
IEEE
13 years 9 months ago
The Cactus Computational Toolkit and using Distributed Computing to Collide Neutron Stars
We are developing a system for collaborative research and development for a distributed group of researchers at different institutions around the world. In a new paradigm for coll...
Gabrielle Allen, Tom Goodale, Joan Massó, E...
CIE
2007
Springer
13 years 11 months ago
Abstract Geometrical Computation and the Linear Blum, Shub and Smale Model
Geometrical Computation and the Linear Blum, Shub and Smale Model Geometrical Computation and the Linear Blum, Shub and Smale Model J´erˆome Durand-Lose Laboratoire d’Informati...
Jérôme Durand-Lose
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
TMC
2010
138views more  TMC 2010»
13 years 3 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
CORR
2006
Springer
122views Education» more  CORR 2006»
13 years 5 months ago
Derivatives of Entropy Rate in Special Families of Hidden Markov Chains
Consider a hidden Markov chain obtained as the observation process of an ordinary Markov chain corrupted by noise. Zuk, et. al. [13, 14] showed how, in principle, one can explicit...
Guangyue Han, Brian Marcus