Sciweavers

TCS
2002
13 years 4 months ago
Set-sharing is redundant for pair-sharing
Although the usual goal of sharing analysis is to detect which pairs of variables share, the standard choice for sharing analysis is a domain that characterizes set-sharing. In th...
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
TEC
1998
99views more  TEC 1998»
13 years 4 months ago
Fitness sharing and niching methods revisited
Abstract—Interest in multimodal optimization function is expanding rapidly since real-world optimization problems often require the location of multiple optima in the search spac...
Bruno Sareni, Laurent Krähenbühl
CORR
2002
Springer
137views Education» more  CORR 2002»
13 years 4 months ago
On ASGS framework: general requirements and an example of implementation
: In the paper we propose general framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying secret sharing scheme. ASGS allows to preven...
Kamil Kulesza, Zbigniew Kotulski
CORR
2002
Springer
122views Education» more  CORR 2002»
13 years 4 months ago
On alternative approach for verifiable secret sharing
The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. T...
Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
JSAC
2007
117views more  JSAC 2007»
13 years 4 months ago
Spectrum sharing for unlicensed bands
We study a spectrum sharing problem in an unlicensed band where multiple systems coexist and interfere with each other. Due to asymmetries and selfish system behavior, unfair and...
Raul Etkin, Abhay Parekh, David Tse
JKM
2007
123views more  JKM 2007»
13 years 4 months ago
Knowledge sharing: moving away from the obsession with best practices
Purpose – How companies can become better at knowing what they know, and share what they know have in recent years become dominant fields of research within knowledge managemen...
Peter Holdt Christensen
JUCS
2008
166views more  JUCS 2008»
13 years 4 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang
JSAC
2008
116views more  JSAC 2008»
13 years 4 months ago
Stability and Efficiency of Unstructured File Sharing Networks
We propose two unstructured file sharing games, unilateral and bilateral unstructured file sharing games, to study the interaction among self-interested players (users) of unstruct...
Honggang Zhang, Giovanni Neglia, Donald F. Towsley...
CORR
2008
Springer
90views Education» more  CORR 2008»
13 years 5 months ago
A Queueing System for Modeling a File Sharing Principle
We investigate in this paper the performance of a file sharing principle similar to the one implemented by eMule. For this purpose, we consider a system composed of N peers becomi...
Florian Simatos, Philippe Robert, Fabrice Guillemi...
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 5 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta