Sciweavers

198 search results - page 25 / 40
» A practical algorithm for constructing oblivious routing sch...
Sort
View
SPAA
2004
ACM
15 years 5 months ago
A scalable lock-free stack algorithm
The literature describes two high performance concurrent stack algorithms based on combining funnels and elimination trees. Unfortunately, the funnels are linearizable but blockin...
Danny Hendler, Nir Shavit, Lena Yerushalmi
LATINCRYPT
2010
14 years 10 months ago
Generic Attacks on Misty Schemes
Abstract. Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to ...
Valérie Nachef, Jacques Patarin, Joana Treg...
88
Voted
GLOBECOM
2006
IEEE
15 years 5 months ago
Leveraging Downlink for Regulation of Distributed Uplink CDMA
Abstract— In this paper, we formulate an optimal rate allocation scheme for uplink and downlink in a single-cell CDMA system. Using concepts from game theory, we show that it is ...
Jennifer Price, Tara Javidi
ICDCS
2010
IEEE
15 years 3 months ago
Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks
—This research focuses on distributed and localized algorithms for precise boundary detection in 3D wireless networks. Our objectives are in two folds. First, we aim to identify ...
Hongyu Zhou, Su Xia, Miao Jin, Hongyi Wu
MOBIHOC
2007
ACM
15 years 11 months ago
Balancing traffic load in wireless networks with curveball routing
We address the problem of balancing the traffic load in multi-hop wireless networks. We consider a point-to-point communicating network with a uniform distribution of source-sink ...
Lucian Popa 0002, Afshin Rostamizadeh, Richard M. ...