Sciweavers

502 search results - page 83 / 101
» Deploying a New Hash Algorithm
Sort
View
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
15 years 6 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
108
Voted
DCOSS
2006
Springer
15 years 6 months ago
Consistency-Based On-line Localization in Sensor Networks
Abstract. We have developed a new on-line error modeling and optimizationbased localization approach for sensor networks in the presence of distance measurement noise. The approach...
Jessica Feng, Lewis Girod, Miodrag Potkonjak
DAGSTUHL
2006
15 years 3 months ago
Decentralization and Mechanism Design for Online Machine Scheduling
We study the online version of the classical parallel machine scheduling problem to minimize the total weighted completion time from a new perspective: We assume that the data of ...
Birgit Heydenreich, Rudolf Müller, Marc Uetz
ISCAPDCS
2003
15 years 3 months ago
GRESS - a Grid Replica Selection Service
Grid technologies and infrastructures facilitate distributed resource sharing and coordination in dynamic, heterogeneous, multi-institutional environments. A replica catalog is a ...
Yong Zhao, Yu Hu
ADHOCNOW
2009
Springer
15 years 3 months ago
Localized Sensor Self-deployment with Coverage Guarantee in Complex Environment
Abstract. In focused coverage problem, sensors are required to be deployed around a given point of interest (POI) with respect to a priority requirement: an area close to POI has h...
Xu Li, Nathalie Mitton, Isabelle Ryl, David Simplo...