Sciweavers

3751 search results - page 641 / 751
» Events in security protocols
Sort
View
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
15 years 10 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein
ISBI
2009
IEEE
15 years 4 months ago
Performance Evaluation of Accelerated Functional MRI Acquisition Using Compressed Sensing
Functional MRI (fMRI) has been widely accepted as a standard tool to study the function of brain. However, because of the limited temporal resolution of MR scanning, researchers h...
Hong Jung, Jong Chul Ye
SAINT
2009
IEEE
15 years 4 months ago
On Enhancing Event-to-Sink Data Delivery Throughput in Sensor Networks
The many-to-one multihop traffic pattern of Wireless Sensor Networks (WSN) puts a great challenge on enhancing the event-to-sink data delivery throughput. Because, in CSMA/CA dri...
Md. Abdur Razzaque, Choong Seon Hong, Jin-Woong Ch...
ETFA
2008
IEEE
15 years 4 months ago
Real-time enabled debugging for distributed systems
The distribution of real-time tasks in a networked environment in principle has several advantages, above all a high degree of flexibility easing system extension and replacement...
Georg Gaderer, Patrick Loschmidt, Thilo Sauter
WISE
2008
Springer
15 years 4 months ago
Approximate Information Filtering in Peer-to-Peer Networks
Abstract. Most approaches to information filtering taken so far have the underlying hypothesis of potentially delivering notifications from every information producer to subscrib...
Christian Zimmer, Christos Tryfonopoulos, Klaus Be...