Sciweavers

2478 search results - page 342 / 496
» Message from the Chair
Sort
View
121
Voted
TCS
2002
15 years 12 days ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
109
Voted
IJHPCA
2010
105views more  IJHPCA 2010»
14 years 11 months ago
A Pipelined Algorithm for Large, Irregular All-Gather Problems
We describe and evaluate a new, pipelined algorithm for large, irregular all-gather problems. In the irregular all-gather problem each process in a set of processes contributes in...
Jesper Larsson Träff, Andreas Ripke, Christia...
VTC
2010
IEEE
162views Communications» more  VTC 2010»
14 years 11 months ago
Cognitive Radio Enabled Multi-Channel Access for Vehicular Communications
—The IEEE 1609.4 standard has been proposed to provide multi-channel operations in wireless access for vehicular environments (WAVE), where all the channels are periodically sync...
Jui-Hung Chu, Kai-Ten Feng, Chen-Nee Chuah, Chin-F...
127
Voted
WDAG
2010
Springer
218views Algorithms» more  WDAG 2010»
14 years 11 months ago
Anonymous Asynchronous Systems: The Case of Failure Detectors
Abstract: Due the multiplicity of loci of control, a main issue distributed systems have to cope with lies in the uncertainty on the system state created by the adversaries that ar...
François Bonnet, Michel Raynal
111
Voted
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
14 years 10 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport