Sciweavers

1845 search results - page 92 / 369
» Computing the Angularity Tolerance
Sort
View
EUC
2008
Springer
15 years 6 months ago
Trusted Spanning Tree for Delay Tolerant MANETs
Quality of service is an important issue in Delay Tolerant Mobile Ad-Hoc Networks (DTMs). This work attempts to improve the Quality of service (QoS) in DTMs by relying on spanning...
Apivadee Piyatumrong, Pascal Bouvry, Fréd&e...
FGCS
2010
119views more  FGCS 2010»
15 years 2 months ago
Characterizing fault tolerance in genetic programming
Evolutionary Algorithms, including Genetic Programming (GP), are frequently employed to solve difficult real-life problems, which can require up to days or months of computation. ...
Daniel Lombraña Gonzalez, Francisco Fern&aa...
WIOPT
2010
IEEE
15 years 2 months ago
Evolutionary forwarding games in Delay Tolerant Networks
—In this paper, we apply evolutionary games to non-cooperative forwarding control of Delay Tolerant Networks (DTN). We focus our study on the probability to deliver a message fro...
Rachid El Azouzi, Francesco De Pellegrini, Vijay K...
IACR
2011
105views more  IACR 2011»
14 years 3 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
FOCS
2006
IEEE
15 years 10 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...