Sciweavers

1792 search results - page 155 / 359
» Improved scheduling in rings
Sort
View
ICDCS
2007
IEEE
15 years 5 months ago
Exploiting Symbolic Techniques in Automated Synthesis of Distributed Programs with Large State Space
Automated formal analysis methods such as program verification and synthesis algorithms often suffer from time complexity of their decision procedures and also high space complex...
Borzoo Bonakdarpour, Sandeep S. Kulkarni
EUC
2007
Springer
15 years 5 months ago
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Abstract. Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main ...
Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashra...
HAPTICS
2005
IEEE
15 years 5 months ago
High Fidelity Multi Finger Haptic Display
The Fingertip Haptic Display (FHD) is a five bar mechanism developed at the University of Washington for haptic interaction with the fingertip of the operator. The twodegree-of-...
Rainer Leuschke, Elizabeth K. T. Kurihara, Jesse D...
ICNP
2005
IEEE
15 years 5 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
ACISP
2005
Springer
15 years 5 months ago
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
Abstract. Multivariate public-key cryptosystems (sometimes polynomial-based PKC’s or just multivariates) handle polynomials of many variables over relatively small fields instea...
Bo-Yin Yang, Jiun-Ming Chen