Sciweavers

312 search results - page 62 / 63
» Protocols for Non-Deterministic Communication over Synchrono...
Sort
View
EUROCRYPT
2007
Springer
15 years 3 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
WISTP
2007
Springer
15 years 3 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette
DSN
2003
IEEE
15 years 2 months ago
Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy Techniques
The presence of physical obstacles and radio interference results in the so called “shadow regions” in wireless networks. When a mobile station roams into a shadow region, it ...
Dongyan Chen, Sachin Garg, Chandra M. R. Kintala, ...
79
Voted
MOVEP
2000
136views Hardware» more  MOVEP 2000»
15 years 1 months ago
UPPAAL - Now, Next, and Future
Uppaal is a tool for modeling, simulation and verification of real-time systems, developed jointly by BRICS at Aalborg University and the Department of Computer Systems at Uppsala ...
Tobias Amnell, Gerd Behrmann, Johan Bengtsson, Ped...
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 3 months ago
A QoS Architecture for IDMA-Based Multi-Service Wireless Networks
— The recent investigations on interleave-division multiple-access (IDMA) have demonstrated its advantage in supporting high-data-rate and multi-rate services over wireless fadin...
Qian Huang, Sammy Chan, King-Tim Ko, Li Ping, Peng...