Results 1  10
of
5,600
Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
, 2003
"... Abstract — As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has n ..."
Abstract

Cited by 703 (15 self)
 Add to MetaCart
attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and locationbased wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find
HighRate Codes that are Linear in Space and Time
 IEEE Trans. Inform. Theory
, 2000
"... Multipleantenna systems that operate at high rates require simple yet effective spacetime transmission schemes to handle the large traffic volume in real time. At rates of tens of bits/sec/Hz, VBLAST, where every antenna transmits its own independent substream of data, has been shown to have good ..."
Abstract

Cited by 422 (13 self)
 Add to MetaCart
Multipleantenna systems that operate at high rates require simple yet effective spacetime transmission schemes to handle the large traffic volume in real time. At rates of tens of bits/sec/Hz, VBLAST, where every antenna transmits its own independent substream of data, has been shown to have
Elementary Gates for Quantum Computation
, 1995
"... We show that a set of gates that consists of all onebit quantum gates (U(2)) and the twobit exclusiveor gate (that maps Boolean values (x, y)to(x, x⊕y)) is universal in the sense that all unitary operations on arbitrarily many bits n (U(2 n)) can be expressed as compositions of these gates. We in ..."
Abstract

Cited by 280 (11 self)
 Add to MetaCart
We show that a set of gates that consists of all onebit quantum gates (U(2)) and the twobit exclusiveor gate (that maps Boolean values (x, y)to(x, x⊕y)) is universal in the sense that all unitary operations on arbitrarily many bits n (U(2 n)) can be expressed as compositions of these gates. We
Experimental Quantum Cryptography
 Journal of Cryptology
, 1992
"... We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a random quantum transmission, consisting of very faint flashes of polarized light; 2) by subsequent public discussion of the ..."
Abstract

Cited by 266 (20 self)
 Add to MetaCart
that any third party's expected information on it is an exponentially small fraction of one bit. Because the system depends on the uncertainty principle of quantum physics, instead of usual mathematical assumptions such as the difficulty of factoring, it remains secure against an adversary
Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance
, 2001
"... The number of steps any classical computer requires in order to find the prime factors of an ldigit integer N increases exponentially with l, at least using algorithms [1] known at present. Factoring large integers is therefore conjectured to be intractable classically, an observation underlying th ..."
Abstract

Cited by 150 (4 self)
 Add to MetaCart
resonance techniques. This method of using nuclei to store quantum information is in principle scalable to many quantum bit systems [13], but such scalability is not implied by the present work. The significance of our work lies in the demonstration of experimental and theoretical techniques for precise
Dataflow Process Networks
 Proceedings of the IEEE
, 1995
"... We review a model of computation used in industrial practice in signal processing software environments and experimentally in other contexts. We give this model the name "dataflow process networks," and study its formal properties as well as its utility as a basis for programming language ..."
Abstract

Cited by 325 (32 self)
 Add to MetaCart
design. Variants of this model are used in commercial visual programming systems such as SPW from the Alta Group of Cadence (formerly Comdisco Systems), COSSAP from Synopsys (formerly Cadis), the DSP Station from Mentor Graphics, and Hypersignal from Hyperception. They are also used in research software
TwoBit Gates Are Universal for Quantum Computation
, 1995
"... A proof is given, which relies on the commutator algebra of the unitary Lie groups, that quantum gates operating on just two bits at a time are sufficient to construct a general quantum circuit. The best previous result had shown the universality of threebit gates, by analogy to the universality of ..."
Abstract

Cited by 182 (9 self)
 Add to MetaCart
the operation of such twobit gates in a physical system with very long phase breaking (i.e., quantum phase coherence) times. Simpler versions of the gearbox computer could be used to do experiments on EinsteinPodolskyRosen states and related entangled quantum states.
The Bittorrent P2P FileSharing System: Measurements and Analysis
 4TH INTERNATIONAL WORKSHOP ON PEERTOPEER SYSTEMS (IPTPS)
, 2005
"... Of the many P2P filesharing prototypes in existence, BitTorrent is one of the few that has managed to attract millions of users. BitTorrent relies on other (global) components for file search, employs a moderator system to ensure the integrity of file data, and uses a bartering technique for downlo ..."
Abstract

Cited by 280 (23 self)
 Add to MetaCart
Of the many P2P filesharing prototypes in existence, BitTorrent is one of the few that has managed to attract millions of users. BitTorrent relies on other (global) components for file search, employs a moderator system to ensure the integrity of file data, and uses a bartering technique
Quantum Field Theory of ManyBody Systems
, 2004
"... condensation Extended objects, such as strings and membranes, have been studied for many years in the context of statistical physics. In these systems, quantum effects are typically negligible, and the extended objects can be treated classically. Yet it is natural to wonder how strings and membrane ..."
Abstract

Cited by 155 (4 self)
 Add to MetaCart
condensation Extended objects, such as strings and membranes, have been studied for many years in the context of statistical physics. In these systems, quantum effects are typically negligible, and the extended objects can be treated classically. Yet it is natural to wonder how strings
The JPEG2000 Still Image Coding System: an Overview
, 2000
"... With the increasing use of multimedia technologies, image compression requires higher performance as well as new features. To address this need in the specific area of still image encoding, a new standard is currently being developed, the JPEC2000. It is not only intended to provide ratedistortion ..."
Abstract

Cited by 259 (2 self)
 Add to MetaCart
distortion and subjective image quality performance superior to existing standards, but also to provide features and functionalities that current standards can either not address efficiently or in many cases cannot address at all. Lossless and lossy compression, embedded lossy to lossless coding, progressive transmission
Results 1  10
of
5,600