Sciweavers

1058 search results - page 126 / 212
» Secure Group Communications Using Key Graphs
Sort
View
118
Voted
ESA
1998
Springer
154views Algorithms» more  ESA 1998»
15 years 6 months ago
A Functional Approach to External Graph Algorithms
We present a new approach for designing external graph algorithms and use it to design simple, deterministic and randomized external algorithms for computing connected components, ...
James Abello, Adam L. Buchsbaum, Jeffery Westbrook
COR
2010
146views more  COR 2010»
15 years 2 months ago
A search space "cartography" for guiding graph coloring heuristics
We present a search space analysis and its application in improving local search algorithms for the graph coloring problem. Using a classical distance measure between colorings, w...
Daniel Cosmin Porumbel, Jin-Kao Hao, Pascale Kuntz
129
Voted
MADNES
2005
Springer
15 years 8 months ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
14 years 9 months ago
Left invertibility of output-quantized systems: An application to cryptography
ABSTRACT. In this paper a secure communication method is proposed, based on left invertibility of output-quantized dynamical systems. The sender uses an output-quantized linear sys...
Nevio Dubbini, Anna Carluccio, Antonio Bicchi
ICPPW
2005
IEEE
15 years 8 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok