Sciweavers

1134 search results - page 164 / 227
» Distributed Proving in Access-Control Systems
Sort
View
ESORICS
2009
Springer
16 years 13 days ago
The Wisdom of Crowds: Attacks and Optimal Constructions
We present a traffic analysis of the ADU anonymity scheme presented at ESORICS 2008, and the related RADU scheme. We show that optimal attacks are able to de-anonymize messages mor...
Carmela Troncoso, Claudia Díaz, Emilia K&au...
VTC
2007
IEEE
102views Communications» more  VTC 2007»
15 years 6 months ago
An Efficient HCF Scheduling Mechanism in Mixed Traffic Scenarios
In this paper an efficient scheduling mechanism for wireless local area networks (WLAN) is proposed. This innovative scheme, named hybrid HCCA-EDCA centralised scheme (HHECS), is b...
David Gozalvez, Jose F. Monserrat, Javier Goz&aacu...
CLUSTER
2003
IEEE
15 years 5 months ago
A Robust Scheduling Strategy for Moldable Scheduling of Parallel Jobs
Moldable job scheduling has been proved to be effective compared to traditionaljob scheduling policies. It is based on the observation that most jobs submitted to a spaceshared pa...
Sudha Srinivasan, Sriram Krishnamoorthy, P. Sadaya...
ICALP
2009
Springer
15 years 6 months ago
Names Trump Malice: Tiny Mobile Agents Can Tolerate Byzantine Failures
Abstract. We introduce a new theoretical model of ad hoc mobile computing in which agents have severely restricted memory, highly unpredictable movement and no initial knowledge of...
Rachid Guerraoui, Eric Ruppert
ATAL
2009
Springer
15 years 6 months ago
Multiagent reinforcement learning: algorithm converging to Nash equilibrium in general-sum discounted stochastic games
This paper introduces a multiagent reinforcement learning algorithm that converges with a given accuracy to stationary Nash equilibria in general-sum discounted stochastic games. ...
Natalia Akchurina