Sciweavers

60 search results - page 12 / 12
» Constraint Solving for Contract-Signing Protocols
Sort
View
CN
2007
117views more  CN 2007»
13 years 5 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
CN
2007
168views more  CN 2007»
13 years 5 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz
AIME
2005
Springer
13 years 7 months ago
EORCA: A Collaborative Activities Representation for Building Guidelines from Field Observations
In the objective of building care team guidelines from field observations, this paper introduces a representation method for describing the medical collaborative activities during ...
Liliane Pellegrin, Nathalie Bonnardel, Franç...
INFOCOM
2005
IEEE
13 years 11 months ago
Smart power-saving mode for IEEE 802.11 wireless LANs
StaticPSM (Power-Saving Mode)schemes employed in the current IEEE 802.11 implementations could not provide any delag-performance guarantee because of their fixed wakeup intervals. ...
Daji Qiao, Kang G. Shin
WECWIS
2002
IEEE
129views ECommerce» more  WECWIS 2002»
13 years 10 months ago
On the Sensitivity of Incremental Algorithms for Combinatorial Auctions
Despite the large amounts of runtime needed to adequately solve a combinatorial auction (CA), existing iterative CA auction protocols require winner determination during every rou...
Ryan Kastner, Christina Hsieh, Miodrag Potkonjak, ...