Sciweavers

724 search results - page 68 / 145
» Gossiping with Multiple Messages
Sort
View
USS
2008
15 years 5 days ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
FLAIRS
2006
14 years 11 months ago
Adaptive, Confidence-Based Strategic Negotiations in Complex Multiagent Environments
We have designed and implemented an adaptive, confidence-based negotiation strategy for conducting multiple, concurrent negotiations among agents in dynamic, uncertain, and real-t...
Xin Li, Leen-Kiat Soh
DAC
2003
ACM
15 years 10 months ago
A tool for describing and evaluating hierarchical real-time bus scheduling policies
We present a tool suite for building, simulating, and analyzing the results of hierarchical descriptions of the scheduling policy for modules sharing a bus in real-time applicatio...
Trevor Meyerowitz, Claudio Pinello, Alberto L. San...
CCS
2009
ACM
15 years 10 months ago
Conditional proxy re-encryption secure against chosen-ciphertext attack
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key w...
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang ...
CHI
2005
ACM
15 years 10 months ago
Tangible user interfaces for children
This poster describes the design and early evaluation of MusicPets. MusicPets allows children to store audio, such as (composed) tunes or recorded messages, on tangible containers...
Glenda Revelle, Oren Zuckerman, Allison Druin, Mar...