Sciweavers

620 search results - page 57 / 124
» The computational power of population protocols
Sort
View
PIMRC
2010
IEEE
14 years 7 months ago
Gaussian two-way relay channel with arbitrary inputs
A two-way relay channel with independent parallel Gaussian channels between the relay and the two terminals is considered. Focusing on the decode-and-forward protocol, the second p...
Deniz Gündüz, Miquel Payaró
SACRYPT
2009
Springer
150views Cryptology» more  SACRYPT 2009»
15 years 4 months ago
Information Theoretically Secure Multi Party Set Intersection Re-visited
We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
WIMOB
2008
IEEE
15 years 4 months ago
Multi-hop Cross-Layer Design in Wireless Sensor Networks: A Case Study
—Cross-layer design has been proposed as a promising paradigm to tackle various problems of wireless communication systems. Recent research has led to a variety of protocols that...
Philipp Hurni, Torsten Braun, Bharat K. Bhargava, ...
ASIACRYPT
2004
Springer
15 years 3 months ago
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)
d abstract) Bartosz Przydatek1 and Reto Strobl2 1 Department of Computer Science, ETH Z¨urich, Switzerland 2 IBM Research, Zurich Research Laboratory, Switzerland In this paper, w...
Bartosz Przydatek, Reto Strobl
CORR
2010
Springer
153views Education» more  CORR 2010»
14 years 10 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan