Sciweavers

3130 search results - page 30 / 626
» Collusion without communication
Sort
View
ACSC
2005
IEEE
15 years 5 months ago
Dependable Dynamic Source Routing without a Trusted Third Party
Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of t...
Asad Amir Pirzada, Chris McDonald, Amitava Datta
AAAI
1994
15 years 1 months ago
Learning to Coordinate without Sharing Information
Researchers in the eld of Distributed Arti cial Intelligence (DAI) have been developing e cient mechanisms to coordinate the activities of multiple autonomous agents. The need for...
Sandip Sen, Mahendra Sekaran, John Hale
TCOS
2010
14 years 6 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
HYBRID
2009
Springer
15 years 6 months ago
Actors without Directors: A Kahnian View of Heterogeneous Systems
This paper aims to simplify recent efforts proposed by the Berkeley school in giving a formal semantics to the Ptolemy toolbox. We achieve this by developing a simple and elegant ...
Paul Caspi, Albert Benveniste, Roberto Lublinerman...
IPPS
2007
IEEE
15 years 6 months ago
Task-pushing: a Scalable Parallel GC Marking Algorithm without Synchronization Operations
This paper describes a scalable parallel marking technique for garbage collection that does not employ any synchronization operation. To achieve good scalability, two major design...
Ming Wu, Xiao-Feng Li