Sciweavers

1503 search results - page 255 / 301
» Self-optimizing distributed trees
Sort
View
AUIC
2005
IEEE
15 years 8 months ago
Newly-discovered Group Awareness Mechanisms for Supporting Real-time Collaborative Authoring
Group awareness has become important in improving the usability of real-time, distributed, collaborative writing systems. However, the current set of implemented awareness mechani...
Gitesh K. Raikundalia, Hao Lan Zhang
ICDCSW
2005
IEEE
15 years 8 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
MOBIQUITOUS
2005
IEEE
15 years 8 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
98
Voted
ATAL
2005
Springer
15 years 8 months ago
Modeling complex multi-issue negotiations using utility graphs
This paper presents an agent strategy for complex bilateral negotiations over many issues with inter-dependent valuations. We use ideas inspired by graph theory and probabilistic ...
Valentin Robu, D. J. A. Somefun, Johannes A. La Po...
CONCUR
2005
Springer
15 years 8 months ago
Selecting Theories and Recursive Protocols
Many decidability results are known for non-recursive cryptographic protocols, where the protocol steps can be expressed by simple rewriting rules. Recently, a tree transducer-base...
Tomasz Truderung