Sciweavers

AGI
2011
14 years 8 months ago
Comparing Humans and AI Agents
Comparing humans and machines is one important source of information about both machine and human strengths and limitations. Most of these comparisons and competitions are performe...
Javier Insa-Cabrera, David L. Dowe, Sergio Espa&nt...
AGI
2011
14 years 8 months ago
Information, Utility and Bounded Rationality
Abstract. Perfectly rational decision-makers maximize expected utility, but crucially ignore the resource costs incurred when determining optimal actions. Here we employ an axiomat...
Daniel Alexander Ortega, Pedro Alejandro Braun
AFRICACRYPT
2011
Springer
14 years 8 months ago
Really Fast Syndrome-Based Hashing
Abstract. The FSB (fast syndrome-based) hash function was submitted to the SHA-3 competition by Augot, Finiasz, Gaborit, Manuel, and Sendrier in 2008, after preliminary designs pro...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
ADT
2011
14 years 8 months ago
Virtual networks: isolation, performance, and trends
Currently, there is a strong effort of the research community in rethinking the Internet architecture to cope with its current limitations and support new requirements. Many resea...
Natalia Castro Fernandes, Marcelo D. D. Moreira, I...
ADHOCNOW
2011
Springer
14 years 8 months ago
Joint Duty Cycle Scheduling, Resource Allocation and Multi-constrained QoS Routing Algorithm
Wireless mesh sensor networks (WMSNs) have recently gained a lot of interest due to their communication capability to support various applications with different Quality of Service...
Jamila Ben Slimane, Yeqiong Song, Anis Koubaa, Mou...
ADHOC
2011
14 years 8 months ago
RadiaLE: A framework for designing and assessing link quality estimators in wireless sensor networks
—Stringent cost and energy constraints impose the use of low-cost and low-power radio transceivers in large-scale wireless sensor networks (WSNs). This fact, together with the ha...
Nouha Baccour, Anis Koubaa, Maissa Ben Jamâa...
ADHOC
2011
14 years 8 months ago
QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations
—Research in wireless mesh networks have been growing in recent years. Many testbeds have been created to study networking protocols in wireless mesh networks. In this work, we d...
Daniel Wu, Dhruv Gupta, Prasant Mohapatra
ACNS
2011
Springer
283views Cryptology» more  ACNS 2011»
14 years 8 months ago
On Hiding a Plaintext Length by Preencryption
It is a well known fact that encryption schemes cannot hide a plaintext length when it is unbounded. We thus admit that an approximation of it may leak and we focus on hiding its p...
Cihangir Tezcan, Serge Vaudenay
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 8 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao