Sciweavers

14158 search results - page 2717 / 2832
» Generalized switch-setting problems
Sort
View
128
Voted
WSNA
2003
ACM
15 years 8 months ago
Information assurance in sensor networks
Sensor networks are deployed to monitor the surroundings and keep the end-user informed about the events witnessed. Different types of events have different levels of importance f...
Budhaditya Deb, Sudeept Bhatnagar, Badri Nath
118
Voted
WWW
2003
ACM
15 years 8 months ago
Make it fresh, make it quick: searching a network of personal webservers
Personal webservers have proven to be a popular means of sharing files and peer collaboration. Unfortunately, the transient availability and rapidly evolving content on such host...
Mayank Bawa, Roberto J. Bayardo Jr., Sridhar Rajag...
158
Voted
XMLSEC
2003
ACM
15 years 8 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
145
Voted
ASIACRYPT
2003
Springer
15 years 8 months ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
126
Voted
ATAL
2003
Springer
15 years 8 months ago
Team formation and communication restrictions in collectives
A collective of agents often needs to maximize a “world utility” function which rates the performance of an entire system, while subject to communication restrictions among th...
Adrian K. Agogino, Kagan Tumer
« Prev « First page 2717 / 2832 Last » Next »