Sciweavers

1368 search results - page 132 / 274
» Avoiding Simplicity Is Complex
Sort
View
ISCI
2008
160views more  ISCI 2008»
13 years 10 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
JSC
2006
64views more  JSC 2006»
13 years 10 months ago
Computing the support of local cohomology modules
For a polynomial ring R = k[x1, ..., xn], we present a method to compute the characteristic cycle of the localization Rf for any nonzero polynomial f R that avoids a direct comput...
Josep Àlvarez Montaner, Anton Leykin
TSP
2008
105views more  TSP 2008»
13 years 10 months ago
Code-Assisted Synchronization for UWB-IR Systems: Algorithms and Analysis
Timing synchronization is a critical challenge in ultra-wideband impulse radios (UWB-IRs). Conventional fulldigital synchronization methods encounter implementation difficulties su...
Yeqiu Ying, Mounir Ghogho, Ananthram Swami
JSS
2007
79views more  JSS 2007»
13 years 10 months ago
Security problems with improper implementations of improved FEA-M
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-d...
Shujun Li, Kwok-Tung Lo
CONNECTION
2004
117views more  CONNECTION 2004»
13 years 10 months ago
Structure and function of evolved neuro-controllers for autonomous robots
The Artificial Life approach to Evolutionary Robotics is used as a fundamental framework for the development of a modular neural control of autonomous mobile robots. The applied e...
Martin Hülse, Steffen Wischmann, Frank Pasema...