Sciweavers

3618 search results - page 594 / 724
» Additive functions for number systems in function fields
Sort
View
ACSAC
2009
IEEE
14 years 5 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
EUROSEC
2009
ACM
14 years 5 months ago
WISDOM: security-aware fibres
The network is becoming faster day by day. High-speed links, of many Gbps, are considered as commodity technology empowering the Internet. On the other hand, Moore’s law still a...
Elias Athanasopoulos, Antonis Krithinakis, Georgio...
WCRE
2009
IEEE
14 years 4 months ago
Tracking Design Smells: Lessons from a Study of God Classes
—“God class” is a term used to describe a certain type of large classes which “know too much or do too much”. Often a God class (GC) is created by accident as functionali...
Stéphane Vaucher, Foutse Khomh, Naouel Moha...
CDC
2008
IEEE
104views Control Systems» more  CDC 2008»
14 years 4 months ago
A structured multiarmed bandit problem and the greedy policy
—We consider a multiarmed bandit problem where the expected reward of each arm is a linear function of an unknown scalar with a prior distribution. The objective is to choose a s...
Adam J. Mersereau, Paat Rusmevichientong, John N. ...
CDC
2008
IEEE
153views Control Systems» more  CDC 2008»
14 years 4 months ago
A stackelberg game for pricing uplink power in wide-band cognitive radio networks
— We study the problem of pricing uplink power in wide-band cognitive radio networks under the objective of revenue maximization for the service provider and while ensuring incen...
Ashraf Al Daoud, Tansu Alpcan, Sachin Kumar Agarwa...