Sciweavers

620 search results - page 11 / 124
» The computational power of population protocols
Sort
View
CONCUR
2008
Springer
14 years 11 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
BMCBI
2010
62views more  BMCBI 2010»
14 years 9 months ago
Forward-time simulation of realistic samples for genome-wide association studies
Background: Forward-time simulations have unique advantages in power and flexibility for the simulation of genetic samples of complex human diseases because they can closely mimic...
Bo Peng, Christopher I. Amos
CORR
2010
Springer
154views Education» more  CORR 2010»
14 years 9 months ago
Cross Layer Aware Adaptive MAC based on Knowledge Based Reasoning for Cognitive Radio Computer Networks
: In this paper we are proposing a new concept in MAC layer protocol design for Cognitive radio by combining information held by physical layer and MAC layer with analytical engine...
Vibhar Pathak, Krishna Chandra Roy, Santosh Kumar ...
100
Voted
EDCC
2010
Springer
15 years 2 months ago
Dependability Analysis of Diffusion Protocols in Wireless Networks with Heterogeneous Node Capabilities
Wireless networks are starting to be populated by interconnected devices that reveal remarkable hardware and software differences. This fact raises a number of questions on the ap...
Paolo Masci, Silvano Chiaradonna, Felicita Di Gian...
76
Voted
MSN
2007
Springer
15 years 3 months ago
Distributed Computation of Maximum Lifetime Spanning Subgraphs in Sensor Networks
Abstract. We present a simple and efficient distributed method for determining the transmission power assignment that maximises the lifetime of a data-gathering wireless sensor net...
Harri Haanpää, André Schumacher, ...