Sciweavers

1610 search results - page 184 / 322
» Identity Based Multisignatures
Sort
View
112
Voted
ECAL
2003
Springer
15 years 6 months ago
Does the Red Queen Reign in the Kingdom of Digital Organisms?
I investigate the competition dynamics between two identical clones of digital organisms, for three sets of clones taken from different locations in the fitness landscape. When t...
Claus O. Wilke
97
Voted
ICNP
2002
IEEE
15 years 5 months ago
Design and Implementation of a TCP-Friendly Transport Protocol for Ad Hoc Wireless Networks
Transport protocol design for mobile ad hoc networks is challenging because of unique issues, including mobilityinduced disconnection, reconnection, and high out-of-order delivery...
Zhenghua Fu, Benjamin Greenstein, Xiaoqiao Meng, S...
100
Voted
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 5 months ago
Optimal mistuning for improved stability of vehicular platoons
— We consider a decentralized bidirectional control of a platoon of N identical vehicles moving in a straight line. Such problems are known to suffer from poor stability margin a...
Prabir Barooah, Prashant G. Mehta
98
Voted
CDC
2009
IEEE
123views Control Systems» more  CDC 2009»
15 years 5 months ago
On the myopic policy for a class of restless bandit problems with applications in dynamic multichannel access
We consider a class of restless multi-armed bandit problems that arises in multi-channel opportunistic communications, where channels are modeled as independent and stochastically...
Keqin Liu, Qing Zhao
145
Voted
WISA
2009
Springer
15 years 5 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar