Sciweavers

3130 search results - page 17 / 626
» Collusion without communication
Sort
View
ICC
2007
IEEE
15 years 6 months ago
Presteering Broadband Antenna Arrays Without Using Steering Delays
Abstract— Presteering of broadband antenna arrays is required to compensate the effect of misalignment between the look direction and the array geometry and is achieved by insert...
Lal C. Godara, Mohammad Reza Sayyah Jahromi
I3E
2001
114views Business» more  I3E 2001»
15 years 1 months ago
Receipt-Freeness in Large-Scale Elections without Untappable Channels
: For an electronic election to be fully democratic there is a need for security mechanisms that will assure the privacy of the voters. With receipt-free electronic voting, a voter...
Emmanouil Magkos, Mike Burmester, Vassilios Chriss...
CHI
2002
ACM
16 years 4 days ago
Trust without touch: jumpstarting long-distance trust with initial social activities
Computer-mediated communication (CMC) is thought to be inadequate when one needs to establish trust. If, however, people meet before using CMC, they trust each other, trust being ...
Jun Zheng, Elizabeth S. Veinott, Nathan Bos, Judit...
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 6 months ago
A New ILP-Based p-Cycle Construction Algorithm without Candidate Cycle Enumeration
—The notion of p-cycle (Preconfigured Protection Cycle) allows capacity efficient schemes to be designed for fast span protection in WDM mesh networks. Conventional p-cycle const...
Bin Wu, Kwan Lawrence Yeung, King-Shan Lui, Shizho...
INFOCOM
1998
IEEE
15 years 4 months ago
How Bad is Reliable Multicast without Local Recovery?
We examine the impact of the loss recovery mechanism on the performance of a reliable multicast protocol. Approaches to reliable multicast can be divided into two major classes: s...
Jörg Nonnenmacher, Martin S. Lacher, Matthias...