Sciweavers

3130 search results - page 35 / 626
» Collusion without communication
Sort
View
SIROCCO
2008
15 years 1 months ago
Remembering without Memory: Tree Exploration by Asynchronous Oblivious Robots
In the effort to understand the algorithmic limitations of computing by a swarm of robots, the research has focused on the minimal capabilities that allow a problem to be solved. ...
Paola Flocchini, David Ilcinkas, Andrzej Pelc, Nic...
DAC
2006
ACM
16 years 24 days ago
Behavior and communication co-optimization for systems with sequential communication media
In this paper we propose a new communication synthesis approach targeting systems with sequential communication media (SCM). Since SCMs require that the reading sequence and writi...
Jason Cong, Yiping Fan, Guoling Han, Wei Jiang, Zh...
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 11 days ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
GLOBECOM
2008
IEEE
15 years 6 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
LCN
2008
IEEE
15 years 6 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong