Sciweavers

881 search results - page 147 / 177
» A Model of Tolerance
Sort
View
98
Voted
EUROCRYPT
2010
Springer
15 years 29 days ago
Constructing Verifiable Random Functions with Large Input Spaces
We present a family of verifiable random functions which are provably secure for exponentially-large input spaces under a non-interactive complexity assumption. Prior construction...
Susan Hohenberger, Brent Waters
AINA
2006
IEEE
14 years 11 months ago
DiVES: A Distributed Support for Networked Virtual Environments
This paper presents DiV ES, a distributed support for the development of networked Distributed Virtual Environments. DiV ES exploits the publish subscribe interaction model to def...
A. Bonotti, Luca Genovali, Laura Ricci
AINA
2007
IEEE
14 years 11 months ago
Cross Layer Routing for Multihop Cellular Networks
Abstract— We propose a unified cross layer routing protocol with multiple constraints for CDMA multihop cellular networks (MCN). Multiple constraints are imposed on intermediate...
Govindan Kannan, Shabbir N. Merchant, Uday B. Desa...
77
Voted
OPODIS
2008
14 years 11 months ago
Rendezvous of Mobile Agents When Tokens Fail Anytime
Abstract. We consider the problem of Rendezvous or gathering of multiple autonomous entities (called mobile agents) moving in an unlabelled environment (modelled as a graph). The p...
Shantanu Das, Matús Mihalák, Rastisl...
77
Voted
CSREASAM
2006
14 years 11 months ago
Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb Tori
After the 9/11 event, terrorist attacks related to vehicles cannot be overlooked. In some critical areas, security should be concerned from the context of streets or vehicle moveme...
Li-Yen Hsu, Shin-Shin Kao