Sciweavers

7195 search results - page 238 / 1439
» On Computing Power
Sort
View
CISS
2010
IEEE
14 years 7 months ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
16 years 4 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
GC
2004
Springer
15 years 9 months ago
Towards a Formal Treatment of Secrecy Against Computational Adversaries
Polynomial time adversaries based on a computational view of cryptography have additional capabilities that the classical Dolev-Yao adversary model does not include. To relate thes...
Angelo Troina, Alessandro Aldini, Roberto Gorrieri
IC
2001
15 years 5 months ago
Active Reliable Multicast Strategies for Internet-Based Grid Computing Infrastructures
Reliable multicast requires that all packets are safely delivered to the destinations. Such communication patterns are intensively used in the so-called grid computing infrastructu...
Moufida Maimour, CongDuc Pham
TON
2008
139views more  TON 2008»
15 years 4 months ago
Stochastic learning solution for distributed discrete power control game in wireless data networks
Distributed power control is an important issue in wireless networks. Recently, noncooperative game theory has been applied to investigate interesting solutions to this problem. Th...
Yiping Xing, Rajarathnam Chandramouli