Sciweavers

102 search results - page 19 / 21
» Bounded Query Functions with Limited Output Bits
Sort
View
ICDCSW
2003
IEEE
14 years 23 days ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 7 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
ESOP
2009
Springer
14 years 2 months ago
All Secrets Great and Small
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
Delphine Demange, David Sands
AUTOMATICA
2007
154views more  AUTOMATICA 2007»
13 years 7 months ago
A globally stable saturated desired compensation adaptive robust control for linear motor systems with comparative experiments
The recently proposed saturated adaptive robust controller is integrated with desired trajectory compensation to achieve global stability with9 much improved tracking performance....
Yun Hong, Bin Yao
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 7 months ago
Stable Takens' Embeddings for Linear Dynamical Systems
Takens' Embedding Theorem remarkably established that concatenating M previous outputs of a dynamical system into a vector (called a delay coordinate map) can be a one-to-one...
Han Lun Yap, Christopher J. Rozell