Sciweavers

275 search results - page 17 / 55
» The Polling Primitive for Computer Networks
Sort
View
IANDC
2008
84views more  IANDC 2008»
14 years 8 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
93
Voted
ICPADS
2005
IEEE
15 years 3 months ago
Efficient Barrier Synchronization on Wireless Computing Systems
This work deals with efficient barrier synchronization for wireless cluster computing where nodes communicate with each other wirelessly in one or multiple hops. Such a computing ...
Nian-Feng Tzeng, Bhanurekha Kasula, Hongyi Wu
ICCS
2005
Springer
15 years 3 months ago
A Computational Model of Micro-vascular Growth
In order to supply a growing tissue with oxygen and nutrients and to remove its metabolic wastes, blood vessels penetrating the tissue are formed. Multiple mechanisms are involved ...
Dominik Szczerba, Gábor Székely
SC
1995
ACM
15 years 1 months ago
A Performance Evaluation of the Convex SPP-1000 Scalable Shared Memory Parallel Computer
The Convex SPP-1000 is the first commercial implementation of a new generation of scalable shared memory parallel computers with full cache coherence. It employs a hierarchical s...
Thomas L. Sterling, Daniel Savarese, Peter MacNeic...
BROADNETS
2005
IEEE
15 years 3 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou