Sciweavers

828 search results - page 97 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
PERCOM
2005
ACM
16 years 2 months ago
Spray computers: Explorations in self-organization
We envision a future in which clouds of microcomputers can be sprayed in an environment to provide, by spontaneously networking with each other, an endlessly range of futuristic a...
Franco Zambonelli, Marie Pierre Gleizes, Marco Mam...
COMCOM
2006
114views more  COMCOM 2006»
15 years 3 months ago
A comparison of epidemic algorithms in wireless sensor networks
We consider the problem of reliable data dissemination in the context of wireless sensor networks. For some application scenarios, reliable data dissemination to all nodes is nece...
Mert Akdere, Cemal Çagatay Bilgin, Ozan Ger...
DRM
2007
Springer
15 years 9 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
CISS
2007
IEEE
15 years 9 months ago
Coherent Optical CDMA with low MAI
Abstract. Spectrally phase-coded optical code division multiple access (OCDMA), demodulated with phase and polarization diversity devices, exhibits high spectral efficiency and low...
A. Brinton Cooper, Jacob B. Khurgin, Shuangmei Xu,...
WOSP
2004
ACM
15 years 8 months ago
Early performance testing of distributed software applications
Performance characteristics, such as response time, throughput and scalability, are key quality attributes of distributed applications. Current practice, however, rarely applies s...
Giovanni Denaro, Andrea Polini, Wolfgang Emmerich