Sciweavers

1255 search results - page 91 / 251
» On Simple and Secure Key Distribution
Sort
View
119
Voted
CEC
2009
IEEE
15 years 10 months ago
When is an estimation of distribution algorithm better than an evolutionary algorithm?
—Despite the wide-spread popularity of estimation of distribution algorithms (EDAs), there has been no theoretical proof that there exist optimisation problems where EDAs perform...
Tianshi Chen, Per Kristian Lehre, Ke Tang, Xin Yao
CSDA
2010
94views more  CSDA 2010»
15 years 3 months ago
Implementing Bayesian predictive procedures: The K-prime and K-square distributions
The implementation of Bayesian predictive procedures under standard normal models is considered. Two distributions are of particular interest, the K-prime and Ksquare distribution...
Jacques Poitevineau, Bruno Lecoutre
128
Voted
RIVF
2007
15 years 5 months ago
Stochastic routing in large grid-shaped quantum networks
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
Cuong Le Quoc, Patrick Bellot, Akim Demaille
132
Voted
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
16 years 3 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
159
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....