Sciweavers

340 search results - page 50 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 7 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang

Publication
222views
14 years 4 months ago
Algorithms and Bounds for Rollout Sampling Approximate Policy Iteration
Abstract: Several approximate policy iteration schemes without value functions, which focus on policy representation using classifiers and address policy learning as a supervis...
Christos Dimitrakakis, Michail G. Lagoudakis
ICC
2007
IEEE
152views Communications» more  ICC 2007»
14 years 2 months ago
Throughput Performance of Pre-coding MIMO Transmission with Multi-Beam Selection
Abstract―We have been proposing multi-beam MIMO (MBMIMO) as an Evolved UTRA downlink MIMO scheme for 3GPP long term evolution (LTE). MB-MIMO is a pre-coding MIMO scheme that uses...
Hiroyuki Seki, Masafumi Tsutsui
JCP
2006
86views more  JCP 2006»
13 years 7 months ago
MapWiki: A Map-based Content Sharing System for Distributed Location-dependent Information
Abstract-- In this paper, we propose a new map-based content sharing system 'MapWiki' for ubiquitous content distribution. In MapWiki, users can publish location-dependen...
Yuuichi Teranishi, Junzo Kamahara, Shinji Shimojo
ACSAC
2009
IEEE
14 years 2 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans