Sciweavers

780 search results - page 37 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
A Novel Prior Knowledge Based ML Channel Estimator for Coherent IR-UWB Systems
Abstract— Channel estimation and synchronization are crucial problems in coherent Ultra wideband (UWB) systems. We develop a new channel estimation scheme that can further improv...
Lei Zhou, Shidong Zhou, Yan Yao
IJNSEC
2007
131views more  IJNSEC 2007»
13 years 7 months ago
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cry...
Debasis Giri, Parmeshwary Dayal Srivastava
ENTCS
2006
124views more  ENTCS 2006»
13 years 7 months ago
A New Rabin-type Trapdoor Permutation Equivalent to Factoring
Public key cryptography has been invented to overcome some key management problems in open networks. Although nearly all aspects of public key cryptography rely on the existence of...
Katja Schmidt-Samoa
DBSEC
2008
89views Database» more  DBSEC 2008»
13 years 9 months ago
A New Approach to Secure Logging
Abstract. The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. The ability to efficiently verify all (or some...
Di Ma, Gene Tsudik
NIPS
2004
13 years 9 months ago
Incremental Algorithms for Hierarchical Classification
We study the problem of hierarchical classification when labels corresponding to partial and/or multiple paths in the underlying taxonomy are allowed. We introduce a new hierarchi...
Nicolò Cesa-Bianchi, Claudio Gentile, Andre...