Sciweavers

39 search results - page 5 / 8
» Decentralized synchronization protocols with nearest neighbo...
Sort
View
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai
COORDINATION
2007
Springer
15 years 6 months ago
A Calculus for Mobile Ad Hoc Networks
We suggest a Calculus for Mobile Ad Hoc Networks, CMAN. A node in a network is a processes equipped with a location, it may communicate with other nodes using synchronous local bro...
Jens Chr. Godskesen
94
Voted
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 6 months ago
An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol
Abstract—The Internet has witnessed a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node independen...
Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, ...
TMC
2010
138views more  TMC 2010»
14 years 10 months ago
Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks
—One important application of cooperative communications is to extend coverage area in wireless networks without increasing infrastructure. However, a crucial challenge in implem...
Ahmed K. Sadek, Zhu Han, K. J. Ray Liu
DCOSS
2011
Springer
14 years 4 days ago
Distributed local broadcasting algorithms in the physical interference model
—Given a set of sensor nodes V where each node wants to broadcast a message to all its neighbors that are within a certain broadcasting range, the local broadcasting problem is t...
Dongxiao Yu, Yuexuan Wang, Qiang-Sheng Hua, Franci...