Sciweavers

11580 search results - page 2045 / 2316
» Communication vs. Computation
Sort
View
CJ
2007
106views more  CJ 2007»
15 years 5 months ago
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Although the Yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment protocols analyzed by researchers from the computer s...
Kim-Kwang Raymond Choo
CN
2007
172views more  CN 2007»
15 years 5 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
171
Voted
CN
2007
148views more  CN 2007»
15 years 5 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel
IIE
2006
130views more  IIE 2006»
15 years 5 months ago
A Study on the Perception of Students towards Educational Weblogs
Weblogs are a popular form of easy-to-use personal publishing that has attracted millions of bloggers to share their personal thoughts, opinions, and knowledge on the web. The vers...
Andrew K. Lui, Sheung-On Choy, Yannie H. Y. Cheung...
IJAHUC
2006
128views more  IJAHUC 2006»
15 years 5 months ago
Avoid 'void' in geographic routing for data aggregation in sensor networks
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
Shigang Chen, Guangbin Fan, Jun-Hong Cui
« Prev « First page 2045 / 2316 Last » Next »