Sciweavers

679 search results - page 49 / 136
» Algorithmic modifications to SPIHT
Sort
View
SODA
2010
ACM
173views Algorithms» more  SODA 2010»
16 years 19 days ago
Distributed Agreement with Optimal Communication Complexity
We consider the problem of fault-tolerant agreement in a crash-prone synchronous system. We present a new randomized consensus algorithm that achieves optimal communication effici...
Seth Gilbert, Dariusz Kowalski
COLCOM
2008
IEEE
15 years 9 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
15 years 8 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
MOBICOM
2000
ACM
15 years 7 months ago
Distributed fair scheduling in a wireless LAN
—Fairness is an important issue when accessing a shared wireless channel. With fair scheduling, it is possible to allocate bandwidth in proportion to weights of the packet flows ...
Nitin H. Vaidya, Paramvir Bahl, Seema Gupta
RT
2000
Springer
15 years 6 months ago
Soft Shadow Maps for Linear Lights
Soft shadows and penumbra regions generated by extended light sources such as linear and area lights are visual effects that significantly contribute to the realism of a scene. In ...
Wolfgang Heidrich, Stefan Brabec, Hans-Peter Seide...