Sciweavers

620 search results - page 104 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
CN
2007
96views more  CN 2007»
14 years 9 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang
INFORMATICALT
2006
102views more  INFORMATICALT 2006»
14 years 9 months ago
Parallel DEM Software for Simulation of Granular Media
The paper describes the development and performance of parallel algorithms for the discrete element method (DEM) software. Spatial domain decomposition strategy and message passing...
Algirdas Maknickas, Arnas Kaceniauskas, Rimantas K...
INFORMATICALT
2006
100views more  INFORMATICALT 2006»
14 years 9 months ago
Optimal Agreement in a Scale-Free Network Environment
Generally, the task in a distributed system must achieve an agreement. It requires a set of processors to agree on a common value even if some components are corrupted. There are s...
Shu-Ching Wang, Kuo-Qin Yan, Mao-Lun Chiang
66
Voted
JSAC
2008
108views more  JSAC 2008»
14 years 9 months ago
Collision-aware design of rate adaptation for multi-rate 802.11 WLANs
One of the key challenges in designing a rate adaptation scheme for IEEE 802.11 wireless LANs (WLANs) is to differentiate bit errors from link-layer collisions. Many recent rate a...
Jaehyuk Choi, Jongkeun Na, Yeon-sup Lim, Kihong Pa...
IEE
2007
54views more  IEE 2007»
14 years 9 months ago
WebML modelling in UML
: In recent years, we have witnessed how the Web Engineering community has started using the standard unified modelling language (UML) notation, techniques and supporting tools fo...
Nathalie Moreno, Piero Fraternali, Antonio Valleci...