Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
Abstract. We present an asymptotically optimal reduction of one-outof-two String Oblivious Transfer to one-out-of-two Bit Oblivious Transfer using Interactive Hashing in conjunctio...
The demand for realistic human characters is driven by interactive application developers worldwide. The look of 3D models in real time graphics is efficiently improved by powerfu...
Florian Struck, Christian-A. Bohn, Sebastian Schmi...
Open trading environments involve a type of peer-to-peer computing characterised by well-defined interaction protocols that are used by the traders and sometimes updated dynamicall...
Martin K. Purvis, Mariusz Nowostawski, Stephen Cra...
In this paper, we present an intelligent and controllable ad hoc network using mobile robot routers in heterogeneous mobile environments. The goal of the mobile robots is to ensur...
Rabah Meraihi, Gwendal Le Grand, Samir Tohmé...