Sciweavers

8825 search results - page 1381 / 1765
» All for one or one for all
Sort
View
150
Voted
TMC
2010
179views more  TMC 2010»
14 years 12 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
TPDS
2010
104views more  TPDS 2010»
14 years 12 months ago
From an Asynchronous Intermittent Rotating Star to an Eventual Leader
—Considering an asynchronous system made up of n processes and where up to t of them can crash, finding the weakest assumption that such a system has to satisfy for a common lea...
Antonio Fernández Anta, Michel Raynal
TPDS
2010
109views more  TPDS 2010»
14 years 12 months ago
Distributed Network Formation for n-Way Broadcast Applications
—In an n-way broadcast application, each one of n overlay nodes wants to push its own distinct large data file to all other n À 1 destinations as well as download their respecti...
Georgios Smaragdakis, Nikolaos Laoutaris, Pietro M...
ASIACRYPT
2010
Springer
14 years 11 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
IMC
2010
ACM
14 years 11 months ago
The impact of YouTube recommendation system on video views
Hosting a collection of millions of videos, YouTube offers several features to help users discover the videos of their interest. For example, YouTube provides video search, relate...
Renjie Zhou, Samamon Khemmarat, Lixin Gao
« Prev « First page 1381 / 1765 Last » Next »