Sciweavers

986 search results - page 146 / 198
» On distributing symmetric streaming computations
Sort
View
ISPA
2005
Springer
15 years 7 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
EURONGI
2004
Springer
15 years 7 months ago
Admission Region of Multimedia Services for EDCA in IEEE 802.11e Access Networks
This paper presents a simulation analysis for the evaluation of the admission region of a IEEE 802.11e network adopting the EDCA (Enhanced Distributed Channel Access) mechanism. In...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
ICALP
2001
Springer
15 years 6 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
CORR
2010
Springer
98views Education» more  CORR 2010»
14 years 11 months ago
Coding for High-Density Recording on a 1-D Granular Magnetic Medium
In terabit-density magnetic recording, several bits of data can be replaced by the values of their neighbors in the storage medium. As a result, errors in the medium are dependent ...
Arya Mazumdar, Alexander Barg, Navin Kashyap
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
14 years 8 months ago
Control of large 1D networks of double integrator agents: Role of heterogeneity and asymmetry on stability margin
We consider the distributed control of a network of heterogeneous agents with double integrator dynamics to maintain a rigid formation in 1D. The control signal at a vehicle is all...
He Hao, Prabir Barooah