Sciweavers

EUC
2007
Springer
15 years 8 months ago
The Reliability of Detection in Wireless Sensor Networks: Modeling and Analyzing
A Wireless Sensor Network (WSN) composed of tiny sensor nodes may operate in an unfavorable terrain. The coupling of inherent limitations and harsh environments makes WSNs fallible...
Ming-Tsung Hsu, Frank Yeong-Sung Lin, Yue-Shan Cha...
PQCRYPTO
2010
152views Cryptology» more  PQCRYPTO 2010»
15 years 8 months ago
Grover vs. McEliece
This paper shows that quantum information-set-decoding attacks are much faster than non-quantum information-set-decoding attacks.
Daniel J. Bernstein
PQCRYPTO
2010
156views Cryptology» more  PQCRYPTO 2010»
15 years 8 months ago
Selecting Parameters for the Rainbow Signature Scheme
Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in a post-quantum world. One of the most promising candidate...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
ESWS
2007
Springer
15 years 8 months ago
Semantic Group Formation
Many approaches to learning and teaching rely upon students working in groups. Formation of optimal groups can be a time consuming and complex task, particularly when the list of ...
Asma Ounnas
PODC
2010
ACM
15 years 8 months ago
Finding mobile data under delay constraints with searching costs
A token is hidden in one of several boxes and then the boxes are locked. The probability of placing the token in each of the boxes is known. A searcher is looking for the token by...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002,...