Sciweavers

620 search results - page 29 / 124
» The computational power of population protocols
Sort
View
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 3 months ago
Elders Know Best - Handling Churn in Less Structured P2P Systems
We address the problem of highly transient populations in unstructured and loosely-structured peerto-peer systems. We propose a number of illustrative query-related strategies and...
Yi Qiao, Fabián E. Bustamante
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 3 months ago
Comparing multicast and newscast communication in evolving agent societies
This paper investigates the effects of two different communication protocols within an artificial society, where communication and cooperation is necessary to survive. Communicat...
A. E. Eiben, Martijn C. Schut, T. Toma
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
JSA
2000
96views more  JSA 2000»
14 years 9 months ago
Design techniques for low-power systems
Portable products are being used increasingly. Because these systems are battery powered, reducing power consumption is vital. In this report we give the properties of low power d...
Paul J. M. Havinga, Gerard J. M. Smit
IWSEC
2007
Springer
15 years 4 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...