Sciweavers

11381 search results - page 2265 / 2277
» Connectivity
Sort
View
INFOCOM
2012
IEEE
13 years 2 days ago
DEAR: Delay-bounded Energy-constrained Adaptive Routing in wireless sensor networks
— Reliability and energy efficiency are critical issues in wireless sensor networks. In this work, we study Delay-bounded Energy-constrained Adaptive Routing (DEAR) problem with...
Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, Cho...
INFOCOM
2012
IEEE
13 years 2 days ago
RxIP: Monitoring the health of home wireless networks
Abstract—Deploying home access points (AP) is hard. Untrained users typically purchase, install, and configure a home AP with very little awareness of wireless signal coverage a...
Justin Manweiler, Peter Franklin, Romit Roy Choudh...
TOG
2012
209views Communications» more  TOG 2012»
13 years 2 days ago
Animating bubble interactions in a liquid foam
Bubbles and foams are important features of liquid surface phenomena, but they are difficult to animate due to their thin films and complex interactions in the real world. In par...
Oleksiy Busaryev, Tamal K. Dey, Huamin Wang, Zhong...
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 2 days ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
CRYPTO
2012
Springer
268views Cryptology» more  CRYPTO 2012»
13 years 2 days ago
Secret Sharing Schemes for Very Dense Graphs
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct the secret while every independent set in the graph does not get any informatio...
Amos Beimel, Oriol Farràs, Yuval Mintz
« Prev « First page 2265 / 2277 Last » Next »