Sciweavers

759 search results - page 141 / 152
» A Perspective on Knowledge Compilation
Sort
View
CORR
2008
Springer
131views Education» more  CORR 2008»
13 years 8 months ago
Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part I: Fast Fading Channels
This is the first part of a two-part paper that studies the problem of jamming in a fixed-rate transmission system with fading, under the general assumption that the jammer has no...
George T. Amariucai, Shuangqing Wei
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 8 months ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
IEICET
2006
108views more  IEICET 2006»
13 years 8 months ago
Plaintext Simulatability
We propose a new security class, called plaintext-simulatability, defined over the public-key encryption schemes. The notion of plaintext simulatability (denoted PS) is similar to ...
Eiichiro Fujisaki
IJMMS
2006
100views more  IJMMS 2006»
13 years 8 months ago
A cognitive approach to user perception of multimedia quality: An empirical investigation
Whilst multimedia technology has been one of the main contributing factors behind the Web's success, delivery of personalised multimedia content has been a desire seldom achi...
Sherry Y. Chen, Gheorghita Ghinea, Robert D. Macre...
JUCS
2008
143views more  JUCS 2008»
13 years 8 months ago
Market Microstructure Patterns Powering Trading and Surveillance Agents
: Market Surveillance plays important mechanism roles in constructing market models. From data analysis perspective, we view it valuable for smart trading in designing legal and pr...
Longbing Cao, Yuming Ou