Sciweavers

448 search results - page 53 / 90
» k-anonymous message transmission
Sort
View
DSRT
2003
IEEE
15 years 5 months ago
An Event-Synchronization Protocol for Parallel Simulation of Large-Scale Wireless Networks
We present a new conservative event-synchronization protocol, time-based synchronization, for parallel discreteevent simulation of mobile ad hoc wireless networks. Simulators that...
Clinton Kelly IV, Rajit Manohar
INFOCOM
1999
IEEE
15 years 4 months ago
A Kalman-Filter Method for Power Control in Broadband Wireless Networks
: A Kalman-filter method for power control is proposed for broadband, packet-switched TDMA wireless networks. By observing the temporal correlation of cochannel interference when t...
Kin K. Leung
CRYPTO
1997
Springer
169views Cryptology» more  CRYPTO 1997»
15 years 4 months ago
Deniable Encryption
Consider a situation in which the transmission of encrypted messages is intercepted by an adversary who can later ask the sender to reveal the random choices and also the secret ...
Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostr...
DCOSS
2010
Springer
15 years 3 months ago
Fast Decentralized Averaging via Multi-scale Gossip
Abstract. We are interested in the problem of computing the average consensus in a distributed fashion on random geometric graphs. We describe a new algorithm called Multi-scale Go...
Konstantinos I. Tsianos, Michael G. Rabbat
CONEXT
2007
ACM
15 years 1 months ago
Towards a clustering based data diffusion protocol in delay tolerant networks
In Delay Tolerant Networks (DTN), diffusion protocols can benefit from the users’ mobility in order to reach some distant nodes. However, existing protocols like flooding pres...
Sana Tmar, Eric Fleury