Sciweavers

620 search results - page 59 / 124
» The computational power of population protocols
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
PDP and GSDL: A New Service Discovery Middleware to Support Spontaneous Interactions in Pervasive Systems
In pervasive computing environments, mobile devices communicate via wireless links without requiring any fixed infrastructure. These devices must be able to discover and share ser...
Andrés Marín López, Carlos Ga...
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 3 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
CCS
2009
ACM
14 years 7 months ago
RFID privacy: relation between two notions, minimal condition, and efficient construction
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of t...
Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li
INFOCOM
2010
IEEE
14 years 8 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
IJON
2006
91views more  IJON 2006»
14 years 9 months ago
Event-based simulation strategy for conductance-based synaptic interactions and plasticity
The immense computational and adaptive power of the cerebral cortex emerges from the collective dynamics of large populations of interacting neurons. Thus, for theoretical investi...
Michelle Rudolph, Alain Destexhe