Sciweavers

60 search results - page 12 / 12
» Constraint Solving for Contract-Signing Protocols
Sort
View
CN
2007
117views more  CN 2007»
14 years 11 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
CN
2007
168views more  CN 2007»
14 years 11 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz
AIME
2005
Springer
15 years 1 months ago
EORCA: A Collaborative Activities Representation for Building Guidelines from Field Observations
In the objective of building care team guidelines from field observations, this paper introduces a representation method for describing the medical collaborative activities during ...
Liliane Pellegrin, Nathalie Bonnardel, Franç...
INFOCOM
2005
IEEE
15 years 5 months ago
Smart power-saving mode for IEEE 802.11 wireless LANs
StaticPSM (Power-Saving Mode)schemes employed in the current IEEE 802.11 implementations could not provide any delag-performance guarantee because of their fixed wakeup intervals. ...
Daji Qiao, Kang G. Shin
WECWIS
2002
IEEE
129views ECommerce» more  WECWIS 2002»
15 years 4 months ago
On the Sensitivity of Incremental Algorithms for Combinatorial Auctions
Despite the large amounts of runtime needed to adequately solve a combinatorial auction (CA), existing iterative CA auction protocols require winner determination during every rou...
Ryan Kastner, Christina Hsieh, Miodrag Potkonjak, ...