Sciweavers

1538 search results - page 226 / 308
» Relative Randomness and Cardinality
Sort
View
85
Voted
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 3 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
IWCMC
2006
ACM
15 years 3 months ago
Priority-based receiver-side relay election in wireless ad hoc sensor networks
Receiver-side relay election has been recently proposed as an alternative to transmitter-side relay selection in wireless ad hoc networks. In this paper we study different priori...
Komlan Egoh, Swades De
MOBICOM
2006
ACM
15 years 3 months ago
Collision avoidance in a dense RFID network
In this work, we develop a CSMA-based MAC protocol to avoid reader-reader and reader-tag collisions in a dense RFID network. The network is implemented using mote-based RFID reade...
Shweta Jain, Samir R. Das
SIGMETRICS
2006
ACM
156views Hardware» more  SIGMETRICS 2006»
15 years 3 months ago
Maximizing throughput in wireless networks via gossiping
A major challenge in the design of wireless networks is the need for distributed scheduling algorithms that will efficiently share the common spectrum. Recently, a few distributed...
Eytan Modiano, Devavrat Shah, Gil Zussman
CCGRID
2005
IEEE
15 years 3 months ago
n-Cycle: a set of algorithms for task distribution on a commodity grid
— The global internet is rich in commodity resources but scarce in specialized resources. We argue that a grid framework can achieve better performance if it separates management...
Ladislau Bölöni, Damla Turgut, Dan C. Ma...