Sciweavers

121 search results - page 3 / 25
» Breaking Fully-Homomorphic-Encryption Challenges
Sort
View
WOWMOM
2009
ACM
147views Multimedia» more  WOWMOM 2009»
13 years 11 months ago
Routing with transmission buffer zones in MANETs
Dealing with link breaks in MANETs is a challenge for the routing protocol. This paper proposes a mechanism to reduce the negative impact of link breaks on the routing. The transm...
Erlend Larsen, Lars Landmark, Vinh Pham, Øi...
COMSUR
2011
263views Hardware» more  COMSUR 2011»
12 years 5 months ago
Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches
—Wireless sensor networks (WSNs) have been applied to many applications since emerging. Among them, one of the most important applications is Sensor Data Collections, where sense...
Feng Wang, Jiangchuan Liu
HUC
2010
Springer
13 years 3 months ago
UBI challenge workshop 2010: real world urban computing
This workshop promotes ubiquitous computing research in authentic urban setting, with real users and with sufficient scale and time span. We first motivate why such research is im...
Timo Ojala, Jukka Riekki
LPAR
2010
Springer
13 years 3 months ago
Dafny: An Automatic Program Verifier for Functional Correctness
Traditionally, the full verification of a program's functional correctness has been obtained with pen and paper or with interactive proof assistants, whereas only reduced ver...
K. Rustan M. Leino
SOCINFO
2010
13 years 3 months ago
Measuring Message Propagation and Social Influence on Twitter.com
Although extensive studies have been conducted on online social networks (OSNs), it is not clear how to characterize information propagation and social influence, two types of impo...
Shaozhi Ye, Shyhtsun Felix Wu