Sciweavers

1426 search results - page 233 / 286
» Broadcasting on networks of workstations
Sort
View
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 9 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
COMCOM
2007
119views more  COMCOM 2007»
14 years 9 months ago
A new high rate adaptive wireless data dissemination scheme
With the increasing popularity of wireless networks and mobile computing, data broadcasting has emerged as an efficient way of delivering data to mobile clients having a high degr...
Petros Nicopolitidis, Georgios I. Papadimitriou, M...
IEEECIT
2010
IEEE
14 years 8 months ago
Technical Research of Streaming Media Video Course Development Platform
—To solve the problem of streaming video courseware high production cost and low efficiency, the video recording and broadcasting system "Estone" gathering multimedia d...
Qingsheng Li, Jipeng Wang
INFOCOM
2010
IEEE
14 years 8 months ago
When Watchdog Meets Coding
Abstract—In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium...
Guanfeng Liang, Rachit Agarwal, Nitin Vaidya
PPSN
2010
Springer
14 years 8 months ago
Variable Neighborhood Search and Ant Colony Optimization for the Rooted Delay-Constrained Minimum Spanning Tree Problem
Abstract. The rooted delay-constrained minimum spanning tree problem is an NP-hard combinatorial optimization problem arising for example in the design of centralized broadcasting ...
Mario Ruthmair, Günther R. Raidl