Sciweavers

502 search results - page 83 / 101
» Deploying a New Hash Algorithm
Sort
View
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
15 years 3 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
DCOSS
2006
Springer
15 years 3 months ago
Consistency-Based On-line Localization in Sensor Networks
Abstract. We have developed a new on-line error modeling and optimizationbased localization approach for sensor networks in the presence of distance measurement noise. The approach...
Jessica Feng, Lewis Girod, Miodrag Potkonjak
DAGSTUHL
2006
15 years 1 months ago
Decentralization and Mechanism Design for Online Machine Scheduling
We study the online version of the classical parallel machine scheduling problem to minimize the total weighted completion time from a new perspective: We assume that the data of ...
Birgit Heydenreich, Rudolf Müller, Marc Uetz
ISCAPDCS
2003
15 years 1 months ago
GRESS - a Grid Replica Selection Service
Grid technologies and infrastructures facilitate distributed resource sharing and coordination in dynamic, heterogeneous, multi-institutional environments. A replica catalog is a ...
Yong Zhao, Yu Hu
ADHOCNOW
2009
Springer
15 years 26 days ago
Localized Sensor Self-deployment with Coverage Guarantee in Complex Environment
Abstract. In focused coverage problem, sensors are required to be deployed around a given point of interest (POI) with respect to a priority requirement: an area close to POI has h...
Xu Li, Nathalie Mitton, Isabelle Ryl, David Simplo...