Sciweavers

2059 search results - page 400 / 412
» A Directed Threshold - Signature Scheme
Sort
View
136
Voted
USENIX
2001
15 years 3 months ago
A Waypoint Service Approach to Connect Heterogeneous Internet Address Spaces
The rapid growth of the Internet has made IP addresses a scarce resource. To get around this problem, today and in the foreseeable future, networks will be deployed with reusable-...
T. S. Eugene Ng, Ion Stoica, Hui Zhang
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
15 years 3 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
135
Voted
ADHOCNOW
2009
Springer
15 years 2 months ago
On Minimizing the Maximum Sensor Movement for Barrier Coverage of a Line Segment
We consider n mobile sensors located on a line containing a barrier represented by a finite line segment. Sensors form a wireless sensor network and are able to move within the lin...
Jurek Czyzowicz, Evangelos Kranakis, Danny Krizanc...
127
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
Flexible multimedia content retrieval using InfoNames
Multimedia content is a dominant fraction of Internet usage today. At the same time, there is significant heterogeneity in video presentation modes and operating conditions of Int...
Arun Kumar, Ashok Anand, Aditya Akella, Athula Bal...
157
Voted
FPGA
2010
ACM
232views FPGA» more  FPGA 2010»
15 years 2 months ago
High-throughput bayesian computing machine with reconfigurable hardware
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
Mingjie Lin, Ilia Lebedev, John Wawrzynek