Sciweavers

6907 search results - page 165 / 1382
» Securing distributed adaptation
Sort
View
OOPSLA
2010
Springer
14 years 8 months ago
An input-centric paradigm for program dynamic optimizations
Accurately predicting program behaviors (e.g., locality, dependency, method calling frequency) is fundamental for program optimizations and runtime adaptations. Despite decades of...
Kai Tian, Yunlian Jiang, Eddy Z. Zhang, Xipeng She...
ICASSP
2009
IEEE
15 years 4 months ago
Distributed parameter estimation with selective cooperation
This paper proposes selective update and cooperation strategies for parameter estimation in distributed adaptive sensor networks. A setmembership filtering approach is employed t...
Stefan Werner, Yih-Fang Huang, Marcello L. R. de C...
98
Voted
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
15 years 3 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin
AINA
2006
IEEE
15 years 4 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
IEEEPACT
1997
IEEE
15 years 2 months ago
Empirical Evaluation of Deterministic and Adaptive Routing with Constant-Area Routers
This paper addresses the issue of how router complexity a ects the overall performance in deterministic and adaptive routing under virtual cut-through switching in k-ary n-cube ne...
Dianne Miller, Walid A. Najjar