Sciweavers

345 search results - page 12 / 69
» Computer-Assisted Simulation Proofs
Sort
View
INFOCOM
2003
IEEE
15 years 2 months ago
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
— Mobile ad hoc networking has been an active research area for several years. How to stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In th...
Sheng Zhong, Jiang Chen, Yang Richard Yang
ICA3PP
2010
Springer
15 years 2 months ago
Strategy-Proof Dynamic Resource Pricing of Multiple Resource Types on Federated Clouds
Abstract. There is growing interest in large-scale resource sharing with emerging architectures such as cloud computing, where globally distributed and commoditized resources can b...
Marian Mihailescu, Yong Meng Teo
VMCAI
2012
Springer
13 years 5 months ago
A General Framework for Probabilistic Characterizing Formulae
Abstract. Recently, a general framework on characteristic formulae was proposed by Aceto et al. It offers a simple theory that allows one to easily obtain characteristic formulae o...
Joshua Sack, Lijun Zhang
IACR
2011
132views more  IACR 2011»
13 years 9 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
78
Voted
DSS
2006
116views more  DSS 2006»
14 years 9 months ago
Matching knowledge elements in concept maps using a similarity flooding algorithm
Concept mapping systems used in education and knowledge management emphasize flexibility of representation to enhance learning and facilitate knowledge capture. Collections of con...
Byron Marshall, Hsinchun Chen, Therani Madhusudan