Sciweavers

3122 search results - page 588 / 625
» A Theory of Network Equivalence
Sort
View
EUROCRYPT
2007
Springer
15 years 3 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
IWCMC
2006
ACM
15 years 3 months ago
Effect of payload length variation and retransmissions on multimedia in 802.11a WLANs
Multimedia transmission over wireless local area networks is challenging due to the varying nature of the wireless channel as well as the inherent difference between multimedia a...
Sayantan Choudhury, Irfan Sheriff, Jerry D. Gibson...
MOBICOM
2005
ACM
15 years 3 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
15 years 3 months ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
FCT
1997
Springer
15 years 1 months ago
Trade-Off Results for Connection Management
A connection management protocol establishes a connection between two hosts across a wide-area network to allow reliable message delivery. Following previous work of Kleinberg et a...
Marios Mavronicolas, Nikos Papadakis