Sciweavers

620 search results - page 82 / 124
» The computational power of population protocols
Sort
View
ATAL
2006
Springer
15 years 1 months ago
A utility-based sensing and communication model for a glacial sensor network
This paper reports on the development of a utility-based mechanism for managing sensing and communication in cooperative multi-sensor networks. The specific application considered...
Paritosh Padhy, Rajdeep K. Dash, Kirk Martinez, Ni...
CCS
2008
ACM
14 years 11 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
SIGMETRICS
2000
ACM
217views Hardware» more  SIGMETRICS 2000»
14 years 9 months ago
Experimenting with an Ad Hoc wireless network on campus: insights and experiences
Ad hoc wireless networks are new communication networks that can be dynamically formed and deformed onthe- y, anytime and anywhere. User data is routed with the help of an ad hoc ...
Chai-Keong Toh, Richard Chen, Minar Delwar, Donald...
CORR
2011
Springer
143views Education» more  CORR 2011»
14 years 1 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
ICN
2007
Springer
15 years 3 months ago
Design Issues of Peer-to-Peer Systems for Wireless Ad Hoc Networks
– Peer-to-peer is a popular distributed system. Mobile ad hoc networks and peer-to-peer file sharing systems both lack fixed infrastructure support and hold no a-priori knowledge...
Dewan Tanvir Ahmed, Shervin Shirmohammadi