Sciweavers

9186 search results - page 1450 / 1838
» A Module System for Scheme
Sort
View
118
Voted
NETWORK
2008
103views more  NETWORK 2008»
15 years 3 months ago
On composability of localization protocols for wireless sensor networks
Realistic, complex, outdoor environments pose significant challenges for node localization in Wireless Sensor Networks. In spite of the fact that many elegant and clever solutions...
Radu Stoleru, John A. Stankovic, Sang Hyuk Son
MCS
2006
Springer
15 years 3 months ago
Three-phase immiscible displacement in heterogeneous petroleum reservoirs
We describe a fractional-step numerical procedure for the simulation of immiscible three-phase flow in heterogeneous porous media that takes into account capillary pressure and ap...
Eduardo Abreu, J. Douglas, Frederico Furtado, D. M...
147
Voted
SCN
2008
Springer
142views Communications» more  SCN 2008»
15 years 3 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
132
Voted
IJNSEC
2007
154views more  IJNSEC 2007»
15 years 3 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
116
Voted
TCOM
2008
97views more  TCOM 2008»
15 years 3 months ago
Error-resilient packet header compression
Network traffic statistics show that, because shorter packets predominate in many applications, headers impose a considerable overhead. But the header content is largely repetitiv...
Vijay Suryavanshi, Aria Nosratinia
« Prev « First page 1450 / 1838 Last » Next »