Sciweavers

16 search results - page 3 / 4
» Accelerating Simulation of Large-Scale IP Networks: A Networ...
Sort
View
JSC
2010
100views more  JSC 2010»
13 years 3 days ago
An invariant-based approach to the verification of asynchronous parameterized networks
A uniform verification problem for parameterized systems is to determine whether a temporal property is satisfied for every instance of the system which is composed of an arbitrar...
Igor V. Konnov, Vladimir A. Zakharov
P2P
2008
IEEE
13 years 11 months ago
Peer-to-Peer Secure Multi-party Numerical Computation
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collabo...
Danny Bickson, Danny Dolev, Genia Bezman, Benny Pi...
MOBIHOC
2008
ACM
14 years 4 months ago
Towards energy efficient VoIP over wireless LANs
Wireless LAN (WLAN) radios conserve energy by staying in sleep mode. With real-time applications like VoIP, it is not clear how much energy can be saved by this approach since pac...
Vinod Namboodiri, Lixin Gao
BMCBI
2010
149views more  BMCBI 2010»
13 years 5 months ago
KID - an algorithm for fast and efficient text mining used to automatically generate a database containing kinetic information o
Background: The amount of available biological information is rapidly increasing and the focus of biological research has moved from single components to networks and even larger ...
Stephanie Heinen, Bernhard Thielen, Dietmar Schomb...
PERCOM
2010
ACM
13 years 3 months ago
Privacy assurance in mobile sensing networks: Go beyond trusted servers
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
Ling Hu, Cyrus Shahabi