Sciweavers

6907 search results - page 911 / 1382
» Securing distributed adaptation
Sort
View
152
Voted
HOTNETS
2010
14 years 10 months ago
The home needs an operating system (and an app store)
Abstract-- We argue that heterogeneity is hindering technological innovation in the home--homes differ in terms of their devices and how those devices are connected and used. To ab...
Colin Dixon, Ratul Mahajan, Sharad Agarwal, A. J. ...
116
Voted
MOC
2010
14 years 10 months ago
Integral deferred correction methods constructed with high order Runge-Kutta integrators
Spectral deferred correction (SDC) methods for solving ordinary differential equations (ODEs) were introduced by Dutt, Greengard and Rokhlin [5]. It was shown in [5] that SDC metho...
Andrew J. Christlieb, Benjamin W. Ong, Jing-Mei Qi...
159
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
147
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
142
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
Packetostatics: deployment of massively dense sensor networks as an electrostatics problem
— We investigate the spatial distribution of wireless nodes that can transport a given volume of traffic in a sensor network, while requiring the minimum number of wireless node...
Stavros Toumpis, Leandros Tassiulas