Sciweavers

777 search results - page 8 / 156
» presence 2010
Sort
View
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
15 years 2 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
127
Voted
COCOA
2010
Springer
14 years 10 months ago
Coverage with k-Transmitters in the Presence of Obstacles
Abstract. For a fixed integer k 0, a k-transmitter is an omnidirectional wireless transmitter with an infinite broadcast range that is able to penetrate up to k "walls",...
Brad Ballinger, Nadia Benbernou, Prosenjit Bose, M...
CDC
2010
IEEE
14 years 7 months ago
Stability robustness in the presence of exponentially unstable isolated equilibria
This note studies nonlinear systems evolving on manifolds with a finite number of asymptotically stable equilibria and a Lyapunov function which strictly decreases outside equilibr...
David Angeli, Laurent Praly
CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 8 hour ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
96
Voted
SOCA
2010
IEEE
14 years 10 months ago
Architecture for transparent helpdesk system with multimodal presence
Companies that are present at multiple online locations may have difficulty staffing them adequately in terms of helpdesk services with efficient use of human resources. In this pa...
Leonel Morgado, Paulo Reis, Fausto de Carvalho, Ti...