Sciweavers

1730 search results - page 311 / 346
» Open Archiving for Open Research
Sort
View
TCC
2007
Springer
89views Cryptology» more  TCC 2007»
15 years 3 months ago
On Secret Sharing Schemes, Matroids and Polymatroids
Abstract. One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brick...
Jaume Martí-Farré, Carles Padr&oacut...
ECRTS
2006
IEEE
15 years 3 months ago
Hierarchical Control of Multiple Resources in Distributed Real-time and Embedded Systems
There is an increasing demand to introduce adaptive capabilities in distributed real-time and embedded (DRE) systems that execute in open environments where system operational con...
Nishanth Shankaran, Xenofon D. Koutsoukos, Douglas...
INFOCOM
2006
IEEE
15 years 3 months ago
Self-Learning Collision Avoidance for Wireless Networks
— The limited number of orthogonal channels and the autonomous installations of hotspots and home wireless networks often leave neighboring 802.11 basic service sets (BSS’s) op...
Chun-cheng Chen, Eunsoo Seo, Hwangnam Kim, Haiyun ...
ISCA
2006
IEEE
125views Hardware» more  ISCA 2006»
15 years 3 months ago
Architectural Semantics for Practical Transactional Memory
Transactional Memory (TM) simplifies parallel programming by allowing for parallel execution of atomic tasks. Thus far, TM systems have focused on implementing transactional stat...
Austen McDonald, JaeWoong Chung, Brian D. Carlstro...
SECPERU
2006
IEEE
15 years 3 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos