Sciweavers

881 search results - page 111 / 177
» A Model of Tolerance
Sort
View
DKE
2006
99views more  DKE 2006»
14 years 9 months ago
How to act on inconsistent news: Ignore, resolve, or reject
Inconsistencies frequently occur in news about the real-world. Some of these inconsistencies may be more significant than others, and some news may contain more inconsistencies th...
Anthony Hunter
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
14 years 9 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
ISCI
2007
82views more  ISCI 2007»
14 years 9 months ago
On reliability of the folded hypercubes
In this paper, we explore the 2-extra connectivity and 2-extra-edge-connectivity of the folded hypercube FQn. We show that j2(FQn) = 3n À 2 for n P 8; and k2(FQn) = 3n À 1 for n...
Qiang Zhu 0003, Jun-Ming Xu, Xinmin Hou, Min Xu
QUESTA
2007
117views more  QUESTA 2007»
14 years 9 months ago
Analyzing a degenerate buffer with general inter-arrival and service times in discrete time
We present the queueing analysis of a degenerate buffer having access to a single server. This system cannot realize any given delay, but only values that are an integer multiple ...
Wouter Rogiest, Koenraad Laevens, Joris Walraevens...
MOBIHOC
2010
ACM
14 years 7 months ago
Security-capacity trade-off in large wireless networks using keyless secrecy
We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n rando...
Sudarshan Vasudevan, Dennis Goeckel, Donald F. Tow...