Sciweavers

2863 search results - page 295 / 573
» Constructing minimum-interference networks
Sort
View
ATAL
2006
Springer
15 years 8 months ago
A decision-theoretic approach to file consistency in constrained peer-to-peer device networks
As users interact with an increasing array of personal computing devices, maintaining consistency of data across those devices becomes significantly more difficult. Typical soluti...
David L. Roberts, Sooraj Bhat, Charles Lee Isbell ...
ASIACRYPT
2003
Springer
15 years 8 months ago
Untraceable Fair Network Payment Protocols with Off-Line TTP
A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchant...
Chih-Hung Wang
ICISC
2008
89views Cryptology» more  ICISC 2008»
15 years 5 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
WSC
1997
15 years 5 months ago
Simulation of the Queston Physician Network
This paper examines the construction and implementation of a simulation model that supports the design and development of the Queston Physician Network. Queston seeks to partner w...
James R. Swisher, J. Brian Jun, Sheldon H. Jacobso...
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
15 years 5 months ago
Inverse modeling for open boundary conditions in channel network
Abstract-- An inverse modeling problem for systems governed by first-order, hyperbolic partial differential equations subject to periodic forcing is investigated. The problem is de...
Qingfang Wu, Mohammad Rafiee, Andrew Tinka, Alexan...