Sciweavers

657 search results - page 49 / 132
» A Version Numbering Scheme with a Useful Lexicographical Ord...
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach
— When a sensor network is deployed in hostile environments, the adversary may compromise some sensor nodes, and use the compromised nodes to inject false sensing reports or modi...
Wensheng Zhang, Guohong Cao
EUROCRYPT
2010
Springer
15 years 2 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
ITIIS
2008
151views more  ITIIS 2008»
14 years 9 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
CODES
2011
IEEE
13 years 9 months ago
Adaptive resource management for simultaneous multitasking in mixed-grained reconfigurable multi-core processors
We propose a novel scheme for run-time management of mixedgrained reconfigurable fabric for the purpose of simultaneous multi-tasking in multi-core reconfigurable processors. Trad...
Waheed Ahmed, Muhammad Shafique, Lars Bauer, J&oum...
ICSE
2003
IEEE-ACM
15 years 9 months ago
Detailing Architectural Design in the Tropos Methodology
Software systems development happens within a context which organizational processes are wellestablished. Hence, software needs to be built with flexible architectures based in so...
Carla T. L. L. Silva, Jaelson Brelaz de Castro, Jo...